FREE Cisco ENCOR 350-401 MCQ Question and Answers
What is the maximum number of WLCs that can be included in a single group when configuring a wireless mobility group?
WLCs can be grouped together to enable traveling across several controllers when inter controller roaming is configured. These teams are known as mobility teams. A mobility group may have up to 24 WLCs in it.
Which authentication technique can be utilized as a backup in the event that the AAA servers go down?
Cisco advises that a centralized AAA server should normally be in charge of managing passwords. However, some sensitive data is typically stored locally by Cisco IOS Software and other infrastructure devices. In the event that the AAA servers go down, some local passwords and secret data, such as special-use usernames, secret keys, and other password data, may be needed. For security, such local passwords ought to be encrypted.
An example of a AAA server is TACACS+. In the unlikely event that the AAA servers go down, TACACS+ is not employed as a backup support system.
An example of a AAA server is RADIUS. RADIUS is not used as backup support in the event that the AAA servers go down.
An example of a AAA server is LDAP. LDAP is not used as backup support in the event that the AAA servers go down.
Wireless LAN (WLAN) communication is done using a technique called orthogonal frequency division multiplexing (OFDM). Which three WLAN protocols among the following support OFDM?
Both 802.11b and 802.11g feature Direct-Sequence Spread Spectrum (DSSS). 802.11a, 802.11g, and 802.11n all enable orthogonal frequency division multiplexing (OFDM). Keep in mind that 802.11g can support DSSS or OFDM. Using a collection of symbols referred to as "chips," DSSS modulates data over a wide frequency range. Because a chip lasts less time than a bit, chips are transmitted more quickly than actual data. These chips additionally encrypt what seems to be random data in addition to the data that will be transferred. In spite of the fact that both parties to a DSSS communication are aware of which chips represent valid data and which do not if a third party were to intercept a DSSS transmission, it would be challenging for them to eavesdrop on the information because they would not be able to quickly identify which chips contained valid bits. OFDM employs a relatively moderate modulation rate for its symbols compared to DSSS's high modulation rate. OFDM is able to sustain high data rates thanks to its slower modulation rate and the simultaneous delivery of data over 52 data streams.
The orchestrator is known as __________________ in Cisco's Enterprise NFV.
The VNF administration and NFV orchestration capabilities are provided by Cisco DNA Center. The deployment of virtualized network services made up of numerous VNFs can be easily automated. No longer included in the Enterprise NFV solution are APIC-EM and ESA.
What distinguishes process switching from CEF?
What are the primary advantages of hosting an application on the cloud?
Scalability is the key advantage of installing an application in the cloud. On-premises installations need more hardware to scale up while cloud deployments can swiftly scale up or down to suit the demands of an application.
What are the two factors to take into account while utilizing SSO as a network redundancy feature? (Select two.)
Please select 2 correct answers
What element determines whether a wired client has access to the network when it connects to an edge switch in a Cisco SD-Access fabric?
In a Cisco SD-Access (Software-Defined Access) fabric, the element that determines whether a wired client has access to the network when it connects to an edge switch is the "Identity Services Engine" (ISE). The Identity Services Engine is a powerful network access control and policy management platform that plays a crucial role in ensuring secure and controlled access to the network.
Which levels of logging are turned on by default?
Debugs are only logged when they are activated with a debug command, however, the console, vty lines, and buffer will log all messages from all severity (logging) levels by default.
What control plane protocol is utilized to map and resolve endpoints in a Cisco SD-Access fabric?
In a Cisco SD-Access (Software-Defined Access) fabric, the control plane protocol utilized to map and resolve endpoints is "LISP" (Locator/ID Separation Protocol).
LISP is a key component of Cisco SD-Access, and it plays a crucial role in providing efficient endpoint identification, segmentation, and mobility within the fabric. LISP allows for the separation of the endpoint identifier (ID) from its location (locator), which helps in achieving scalable and flexible network designs.
In the Cisco SD-Access architecture, what technology is used to offer Layer 2 and Layer 3 logical networks?
In the Cisco SD-Access (Software-Defined Access) architecture, the technology used to offer Layer 2 and Layer 3 logical networks is the "overlay network."
An overlay network is a virtual network that is built on top of the physical network infrastructure. It allows the creation of logical network segments that are independent of the underlying physical network topology. In the context of Cisco SD-Access, the overlay network is a fundamental concept that enables the implementation of virtual networks to provide segmentation, policy enforcement, and mobility for different user groups and devices.
What distinguishes the RIB from the FIB?
Where is radio resource management carried out in a wireless Cisco SD-Access solution?
In a wireless Cisco SD-Access solution, radio resource management is carried out by the "control plane node." The control plane node is a key component in the SD-Access fabric that is responsible for managing and coordinating the wireless network resources.
What advantage does an on-premises deployment lack that a cloud infrastructure deployment offers?
One advantage that a cloud infrastructure deployment offers, which an on-premises deployment lacks, is "efficient scalability."
What function does a Cisco SD-WAN deployment's vSmart controller have?
The function of a Cisco SD-WAN deployment's vSmart controller is to "distribute policies that govern data forwarding performed within the Cisco SD-WAN fabric."
The vSmart controller is a key component in the SD-WAN architecture and plays a central role in managing the control plane of the SD-WAN fabric. It is responsible for distributing and enforcing policies that dictate how data traffic should be forwarded across the SD-WAN network.
What is the proper mapping between IP Prec 4's Flash Override and DSCP Codepoint?
The only response that exclusively maps to Flash Override is AF41, AF42, and AF43.