Home > Share your ENCOR Experience

Share your ENCOR Experience

January 7th, 2020 in Share Experience Go to comments

The new ENCOR 350-401 has come to replace the old CCNP exams so we create the “Share your ENCOR Experience” for everyone to share their experience to prepare for this new exam.

Please share with us your experience to prepare for the new ENCOR 350-401 exam, your materials, the way you learned, your recommendations… But please DO NOT share any information about the detail of the exam or your personal information, your score, exam date and location, your email…

Note:
+ The ENCOR 350-401 exam include lab sims, multiple choice and Drag drop questions.
+ To get the new CCNP Enterprise certificate, you need to pass this ENCOR 350-401 exam (core exam) and one of the concentration exam.

Your posts are warmly welcome! Hope you will find useful information here!

Comments
Comment pages
1 11 12 13 14 15 169 2950
  1. Pascal
    March 25th, 2020

    The syntax of an extended ACL is shown below:

    access-list access-list-number {permit | deny} protocol source {source-mask} destination {destination-mask} [eq destination-port]

  2. testexam
    March 25th, 2020

    please read carefully this link

    https://home.pearsonvue.com/coronavirus-update

    not all country can shedule exam

  3. Anonymous
    March 25th, 2020

    Cisco TrustSec uses tags to represent logical group privilege. This tag, called a Security Group Tag (SGT),
    is used in access policies. The SGT is understood and is used to enforce traffic by Cisco switches, routers and
    firewalls. Cisco TrustSec is defined in three phases: classification, propagation and enforcement.
    When users and devices connect to a network, the network assigns a specific security group. This process is
    called classification. Classification can be based on the results of the authentication or by associating theSGT
    with an IP, VLAN, or port-profile

  4. jeancisco
    March 25th, 2020

    ype 5 passwords: These passwords use an improved Cisco proprietary encryption
    algorithm that makes use of the MD5 hashing algorithm. This makes them much stronger
    because they are considered not reversible (uncrackable). The only way to crack
    type 5 passwords is by performing brute-force attacks. It is strongly recommended
    that you use type 5 encryption instead of type 0 or type 7 whenever possible. Type
    5 encryption is applied by using the command enable secret to specify an additional
    layer of security over the command enable password.

  5. jeancisco
    March 25th, 2020

    he IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 65535, most transmission links enforce a smaller maximum packet length limit, called an MTU. The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences since it allows routers to fragment IP datagrams as necessary. The receiving station is responsible for the reassembly of the fragments back into the original full size IP datagram.

    Fragmentation and Path Maximum Transmission Unit Discovery (PMTUD) is a standardized technique to determine the maximum transmission unit (MTU) size on the network path between two hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in IPv4. However, all modern operating systems use it on endpoints.

    The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.

    TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints. PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is used to dynamically determine the lowest MTU along the path from a packet’s source to its destination.

  6. Anonymous
    March 25th, 2020

    he tunneling technology used for the fabric data plane is based on Virtual Extensible LAN (VXLAN). VXLAN encapsulation is UDP based, meaning that it can be forwarded by any IP-based network (legacy or third party) and creates the overlay network for the SD-Access fabric. Although LISP is the control plane for the SD-Access fabric, it does not use LISP data encapsulation for the data plane; instead, it uses VXLAN encapsulation because it is capable of encapsulating the original Ethernet header to perform MAC-in-IP encapsulation, while LISP does not. Using VXLAN allows the SD-Access fabric to support Layer 2 and Layer 3 virtual topologies (overlays) and the ability to operate over any IP-based network with built-in network segmentation (VRF instance/VN) and built-in group-based policy.

  7. Makk
    March 26th, 2020

    Where will I get all the question here?

  8. CCNP1
    March 26th, 2020

    Which statement about TLS is true when using RESTCONF to write configurations on network devices?
    A. It is used for HTTP and HTTPS requests.
    B. It requires certificates for authentication.
    C. It is provided using NGINX acting as a proxy web server.
    D. It is not supported on Cisco devices.

    B or C

  9. CCNP1
    March 26th, 2020

    What are two common sources of interference for Wi-Fi networks? (Choose two.)
    A. LED lights
    B. radar
    C. fire alarm
    D. conventional oven
    E. rogue AP

    DE or AE

  10. CCNP1
    March 26th, 2020

    Which two pieces of information are necessary to compute SNR? (Choose two.)
    A. transmit power
    B. noise floor
    C. EIRPD.
    D. RSSI
    E. antenna gain

    AB or BD

  11. Anonymous
    March 26th, 2020

    Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
    A. security group tag ACL assigned to each port on a switch
    B. security group tag number assigned to each user on a switch
    C. security group tag number assigned to each port on a network
    D. security group tag ACL assigned to each router on a network

    A or D ?

  12. Anonymous
    March 26th, 2020

    he IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 65535, most transmission links enforce a smaller maximum packet length limit, called an MTU. The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences since it allows routers to fragment IP datagrams as necessary. The receiving station is responsible for the reassembly of the fragments back into the original full size IP datagram.

    Fragmentation and Path Maximum Transmission Unit Discovery (PMTUD) is a standardized technique to determine the maximum transmission unit (MTU) size on the network path between two hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in IPv4. However, all modern operating systems use it on endpoints.

    The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.

  13. CCNP1
    March 26th, 2020

    Asymmetric Routing Support in Active Active Mode

    In general, avoid asymmetric routing in a firewall design solution. The ASR feature is purely to protect issues such as link failovers. Note that even though state is shared between the Active and Standby firewalls periodically, it is possible to have race conditions, which could cause connections to be dropped

  14. Anonymous
    March 26th, 2020

    5% 1.0 Architecture
    1.1 Explain the different design principles used in an enterprise network
    1.1.a Enterprise network design such as Tier 2, Tier 3, and Fabric Capacity planning
    1.1.b High availability techniques such as redundancy, FHRP, and SSO
    1.2 Analyze design principles of a WLAN deployment
    1.2.a Wireless deployment models (centralized, distributed, controller-less, controller
    based, cloud, remote branch)
    1.2.b Location services in a WLAN design
    1.3 Differentiate between on-premises and cloud infrastructure deployments
    1.4 Explain the working principles of the Cisco SD-WAN solution
    1.4.a SD-WAN control and data planes elements
    1.4.b Traditional WAN and SD-WAN solutions
    1.5 Explain the working principles of the Cisco SD-Access solution
    1.5.a SD-Access control and data planes elements
    1.5.b Traditional campus interoperating with SD-Access
    1.6 Describe concepts of wired and wireless QoS
    1.6.a QoS components
    1.6.b QoS policy
    1.7 Differentiate hardware and software switching mechanisms
    1.7.a Process and CEF
    1.7.b MAC address table and TCAM
    1.7.c FIB vs. RIB

  15. Anonymous
    March 26th, 2020

    Cisco TrustSec uses tags to represent logical group privilege. This tag, called a Security Group Tag (SGT),

  16. Iuhanna
    March 26th, 2020

    Guy’s which lab come in the exam 350 – 401

  17. CCNP1
    March 26th, 2020

    @Iuhanna there no lab.
    Pure D&D, MCQs

  18. Mikeyeah
    March 26th, 2020

    Hi Guys,

    Please see link below to v1.0 VCE file with 100Qs you will need a copy of VCE 1.1.2 to open this file. These are the questions showing up currently, though be aware new questions can appear at any time!

    https : // mega.nz /#! UWoSkarY!Jo16HvBLkK1Aq5CDd3U3pc_6GBpti9acskDdbFyczQQ

    you know the drill remove the spaces, remember this is V1 so any new questions or any incorrect answers let me know and i’ll amend going forward.

    Mikeyeah!

  19. Jacob
    March 26th, 2020

    Hey Guys, I can see similar pages to this like:

    – Rstut for CCIE
    – 9tut for CCNA
    – Wirelesstut for Wireless certs

    Is the any page for CCNP Datacenter?
    I´m Looking forward to hear from you.

  20. ciscoed
    March 26th, 2020

    Hello guys!)
    Dump for 350-401:
    https: // dropmefiles.com / YksGR

    I modified it a little
    the link is active for 5 days

    there were new two questions on the exam that weren’t there: VTP/JSON

  21. Mikeyeah
    March 26th, 2020

    Hi Guys,
    Please see link below to v1.0 VCE file with 100Qs you will need a copy of VCE 1.1.2 to open this file. These are the questions showing up currently, though be aware new questions can appear at any time!
    https : // mega.nz /#! UWoSkarY!Jo16HvBLkK1Aq5CDd3U3pc_6GBpti9acskDdbFyczQQ
    you know the drill remove the spaces, remember this is V1 so any new questions or any incorrect answers let me know and i’ll amend going forward.
    Mikeyeah

  22. ccnp1
    March 27th, 2020

    @ciscoed there 16 Qs difference from digitaltut.
    have u took the exam ?

  23. Anonymous
    March 27th, 2020

    Glean adjacency – in short when the router is directly connected to hosts the FIB table on the router will maintain a prefix for the subnet rather than for the individual host prefix. This subnet prefix points to a GLEAN adjacency. A glean adjacency entry indicates that a particular next hop should be directly connected, but there is no MAC header rewrite information available. When the device needs to forward packets to a specific host on a subnet, Cisco Express Forwarding requests an ARP entry for the specific prefix, ARP sends the MAC address, and the adjacency entry for the host is built.

  24. Anonymous
    March 27th, 2020

    1.2.b Location services in a WLAN design
    1.3 Differentiate between on-premises and cloud infrastructure deployments
    1.4 Explain the working principles of the Cisco SD-WAN solution
    1.4.a SD-WAN control and data planes elements
    1.4.b Traditional WAN and SD-WAN solutions
    1.5 Explain the working principles of the Cisco SD-Access solution
    1.5.a SD-Access control and data planes elements
    1.5.b Traditional campus interoperating with SD-Access
    1.6 Describe concepts of wired and wireless QoS
    1.6.a QoS components
    1.6.b QoS policy
    1.7 Differentiate hardware and software switching mechanisms
    1.7.a Process and CEF
    1.7.b MAC address table and TCAM
    1.7.c FIB vs. RIB

  25. Mikeyeah
    March 27th, 2020

    Hi all,
    Please see link below to v1.0 VCE file with 100Qs you will need a copy of VCE 1.1.2 to open this file. These are the questions showing up currently, though be aware new questions can appear at any time!
    https : // mega.nz /#! UWoSkarY!Jo16HvBLkK1Aq5CDd3U3pc_6GBpti9acskDdbFyczQQ
    you know the drill remove the spaces, remember this is V1 so any new questions or any incorrect answers let me know and i’ll amend going forward.
    Mikeyeah

  26. Anonymous
    March 27th, 2020

    @ccnp1

    please any update about certifications extension !!!

  27. TestTest
    March 27th, 2020

    Please help me with vce reader !!! Please

  28. Tandreas
    March 27th, 2020

    @Anonymous open the link and read!!!!
    Cisco did a FAQ on their website.

    STOP asking about certifications extension!
    Why so many people here are so dumb?

    https://learningnetwork.cisco.com/s/blogs/a0D3i00000360ZcEAI/were-extending-the-expiration-date-for-all-active-certifications

  29. Anonymous
    March 27th, 2020

    NishG and aqueel-ahmed are correct. The certification extension will be fully processed within the next two weeks and you should see it reflected in your Certification Tracking System profile after this time.

  30. to Evelyn
    March 28th, 2020

    do you have free one ? not with $

  31. TAG
    March 28th, 2020

    Hello, is the Premium membership access valid to pass the exam

  32. fake
    March 28th, 2020

    Firepower Threat Defense (FTD) provides six interface modes which are: Routed, Switched, Inline Pair, Inline Pair with Tap, Passive, Passive (ERSPAN).

    When Inline Pair Mode is in use, packets can be blocked since they are processed inline

  33. Pascal
    March 28th, 2020

    Hi
    @All
    any update about question for exam cisco 350-401 !

  34. @@Charllotte
    March 28th, 2020

    @Charllotte

    stop to say anythink because some country for centre personvue are close
    https://home.pearsonvue.com/coronavirus-update#country-specific

  35. jack
    March 28th, 2020

    A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?
    A. Autonomous
    B. Mobility express
    C. SD-Access wireless
    D. Local mode

  36. teddy
    March 28th, 2020

    Hi all! Does any have link for the original ENCOR 300-401 Cisco Press book in pdf? Previously I saw here converted format from epub….
    Thank you and good luck for the exam.

  37. Gentao
    March 28th, 2020

    how many questions on the exam now?

  38. Mikeyeah
    March 28th, 2020

    Hi all,

    NOT SPAM!!!!

    Please see link below to v1.0 VCE file with 100Qs you will need a copy of VCE 1.1.2 to open this file. These are the questions showing up currently, though be aware new questions can appear at any time!
    https : // mega.nz /#! UWoSkarY!Jo16HvBLkK1Aq5CDd3U3pc_6GBpti9acskDdbFyczQQ
    this is V1 so any new questions or any incorrect answers let me know and i’ll amend going forward.

  39. Anonymous
    March 29th, 2020

    @Mikeyeah

    Thank you for the link, but this is not valid VCE file.

  40. Mikeyeah
    March 29th, 2020

    @anoy

    What do you mean not valid?

  41. Paswd
    March 29th, 2020

    @Mikeyeah,

    How do I access this file – do I need to have an email account with MEGA?

  42. Mikeyeah
    March 29th, 2020

    @paswd

    No you should just be able to download directly from the link above.

  43. Paswd
    March 29th, 2020

    @Mikeyeah,

    Thank you, I got it. Now working on getting vce file.

  44. npcorecc
    March 29th, 2020

    @Mikeyeah i try to open with 1.1.2 version but i got error like this error retrieving key to decrypt the file **
    how i can fix it ??

  45. Mikeyeah
    March 29th, 2020

    You only need to open it in the player, I just double checked and it’s working fine


  46. Note: Please do not open any suspicious links (especially short links and links that need to remove some words to open) in the comment section above as they are usually spams and may harm your computer.
Comment pages
1 11 12 13 14 15 169 2950
  1. No trackbacks yet.