Esame 350-401 ENCOR- Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR)

Implementing and Operating Cisco Enterprise Network Core Technologies

Codice Esame : 350-401 ENCOR
versione : 1
Vendor : Cisco

This exam tests your knowledge and skills related to implementing core enterprise network technologies, including: Dual stack (IPv4 and IPv6) architecture Virtualization Infrastructure Network assurance Security Automation

Area : Enterprise 
Status : Active 
Esame iniziato il: 24-2-2020 terminato il :  
Durata (minuti): 120
Domande : min None – max None 

Punteggio : min None max 1000
Costo : 

Exam topics:

  • 1.0 – Architecture – 15%
    • 1.1 – Explain the different design principles used in an enterprise network 
    • 1.1.a – Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning 
    • 1.1.b – High availability techniques such as redundancy, FHRP, and SSO 
    • 1.2 – Analyze design principles of a WLAN deployment 
    • 1.2.a – Wireless deployment models (centralized, distributed, controller-less, controller based, cloud, remote branch) 
    • 1.2.b – Location services in a WLAN design 
    • 1.3 – Differentiate between on-premises and cloud infrastructure deployments 
    • 1.4 – Explain the working principles of the Cisco SD-WAN solution 
    • 1.4.a – SD-WAN control and data planes elements 
    • 1.4.b – Traditional WAN and SD-WAN solutions 
    • 1.5 – Explain the working principles of the Cisco SD-Access solution 
    • 1.5.a – SD-Access control and data planes elements 
    • 1.5.b – Traditional campus interoperating with SD-Access 
    • 1.6 – Describe concepts of wired and wireless QoS 
    • 1.6.a – QoS components 
    • 1.6.b – QoS policy 
    • 1.7 – Differentiate hardware and software switching mechanisms 
    • 1.7.a – Process and CEF 
    • 1.7.b – MAC address table and TCAM 
    • 1.7.c – FIB vs. RIB 
  • 2.0 – Virtualization – 10%
    • 2.1 – Describe device virtualization technologies 
    • 2.1.a – Hypervisor type 1 and 2 
    • 2.1.b – Virtual machine 
    • 2.1.c – Virtual switching 
    • 2.2 – Configure and verify data path virtualization technologies 
    • 2.2.a – VRF 
    • 2.2.b – GRE and IPsec tunneling 
    • 2.3 – Describe network virtualization concepts 
    • 2.3.a – LISP 
    • 2.3.b – VXLAN 
  • 3.0 – Infrastructure – 30%
    • 3.1 – Layer 2 
    • 3.1.a – Troubleshoot static and dynamic 802.1q trunking protocols 
    • 3.1.b – Troubleshoot static and dynamic EtherChannels 
    • 3.1.c – Configure and verify common Spanning Tree Protocols (RSTP and MST) 
    • 3.2 – Layer 3 
    • 3.2.a – Compare routing concepts of EIGRP and OSPF (advanced distance vector vs. linked state, load balancing, path selection, path operations, metrics) 
    • 3.2.b – Configure and verify simple OSPF environments, including multiple normal areas, summarization, and filtering (neighbor adjacency, point-to-point and broadcast network types, and passive interface) 
    • 3.2.c – Configure and verify eBGP between directly connected neighbors (best path selection algorithm and neighbor relationships) 
    • 3.3 – Wireless 
    • 3.3.a – Describe Layer 1 concepts, such as RF power, RSSI, SNR, interference noise, band and channels, and wireless client devices capabilities 
    • 3.3.b – Describe AP modes and antenna types 
    • 3.3.c – Describe access point discovery and join process (discovery algorithms, WLC selection process) 
    • 3.3.d – Describe the main principles and use cases for Layer 2 and Layer 3 roaming 
    • 3.3.e – Troubleshoot WLAN configuration and wireless client connectivity issues 
    • 3.4 – IP Services 
    • 3.4.a – Describe Network Time Protocol (NTP) 
    • 3.4.b – Configure and verify NAT/PAT 
    • 3.4.c – Configure first hop redundancy protocols, such as HSRP and VRRP 
    • 3.4.d – Describe multicast protocols, such as PIM and IGMP v2/v3 
  • 4.0 – Network Assurance – 10%
    • 4.1 – Diagnose network problems using tools such as debugs, conditional debugs, trace route, ping, SNMP, and syslog 
    • 4.2 – Configure and verify device monitoring using syslog for remote logging 
    • 4.3 – Configure and verify NetFlow and Flexible NetFlow 
    • 4.4 – Configure and verify SPAN/RSPAN/ERSPAN 
    • 4.5 – Configure and verify IPSLA 
    • 4.6 – Describe Cisco DNA Center workflows to apply network configuration, monitoring, and management 
    • 4.7 – Configure and verify NETCONF and RESTCONF 
  • 5.0 – Security – 20%
    • 5.1 – Configure and verify device access control 
    • 5.1.a – Lines and password protection 
    • 5.1.b – Authentication and authorization using AAA 
    • 5.2 – Configure and verify infrastructure security features 
    • 5.2.a – ACLs 
    • 5.2.b – CoPP 
    • 5.3 – Describe REST API security 
    • 5.4 – Configure and verify wireless security features 
    • 5.4.a – EAP 
    • 5.4.b – WebAuth 
    • 5.4.c – PSK 
    • 5.5 – Describe the components of network security design 
    • 5.5.a – Threat defense 
    • 5.5.b – Endpoint security 
    • 5.5.c – Next-generation firewall 
    • 5.5.d – TrustSec, MACsec 
    • 5.5.e – Network access control with 802.1X, MAB, and WebAuth 
  • 6.0 – Automation – 15%
    • 6.1 – Interpret basic Python components and scripts 
    • 6.2 – Construct valid JSON encoded file 
    • 6.3 – Describe the high-level principles and benefits of a data modeling language, such as YANG 
    • 6.4 – Describe APIs for Cisco DNA Center and vManage 
    • 6.5 – Interpret REST API response codes and results in payload using Cisco DNA Center and RESTCONF 
    • 6.6 – Construct EEM applet to automate configuration, troubleshooting, or data collection 
    • 6.7 – Compare agent vs. agentless orchestration tools, such as Chef, Puppet, Ansible, and SaltStack 

Link all’esame sul sito ufficiale 350-401 ENCOR – Implementing and Operating Cisco Enterprise Network Core Technologies

Follow me

Rispondi

Questo sito usa Akismet per ridurre lo spam. Scopri come i tuoi dati vengono elaborati.