ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 10

Question list
Search
Search

List of questions

Search

Related questions











How is 802.11 traffic handled in a fabric-enabled SSID?

A.

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

A.

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

Answers
B.

converted by the AP into 802.3 and encapsulated into VXLAN

B.

converted by the AP into 802.3 and encapsulated into VXLAN

Answers
C.

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

C.

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

Answers
D.

converted by the AP into 802.3 and encapsulated into a VLAN

D.

converted by the AP into 802.3 and encapsulated into a VLAN

Answers
Suggested answer: B

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

A.

SNR

A.

SNR

Answers
B.

Noise

B.

Noise

Answers
C.

RSSI

C.

RSSI

Answers
D.

CCI

D.

CCI

Answers
Suggested answer: A

Refer to the exhibit.

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24.

The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet.

Which of this behavior is true?

A.

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.

A.

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.

Answers
B.

Only standard access control lists can block traffic from a source IP address.

B.

Only standard access control lists can block traffic from a source IP address.

Answers
C.

After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.

C.

After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.

Answers
D.

The access control list must contain an explicit deny to block traffic from the router.

D.

The access control list must contain an explicit deny to block traffic from the router.

Answers
Suggested answer: A

Refer to the exhibit.

A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Explanation:

Broadcast and Non-Broadcast networks elect DR/BDR while Point-topoint/ multipoint do not elect DR/BDR. Therefore we have to set the two Gi0/0 interfaces to point-to-point or point-to-multipoint network to ensure that a DR/BDR election does not occur.

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

A.

least privilege

A.

least privilege

Answers
B.

fail-safe defaults

B.

fail-safe defaults

Answers
C.

economy of mechanism

C.

economy of mechanism

Answers
D.

complete mediation

D.

complete mediation

Answers
Suggested answer: B

How does an on-premises infrastructure compare to a cloud infrastructure?

A.

On-premises can increase compute power faster than cloud

A.

On-premises can increase compute power faster than cloud

Answers
B.

On-premises requires less power and cooling resources than cloud

B.

On-premises requires less power and cooling resources than cloud

Answers
C.

On-premises offers faster deployment than cloud

C.

On-premises offers faster deployment than cloud

Answers
D.

On-premises offers lower latency for physically adjacent systems than cloud.

D.

On-premises offers lower latency for physically adjacent systems than cloud.

Answers
Suggested answer: D

Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?

A.

Change the access-list destination mask to a wildcard.

A.

Change the access-list destination mask to a wildcard.

Answers
B.

Change the source network that Is specified in access-list 101.

B.

Change the source network that Is specified in access-list 101.

Answers
C.

Change the route-map configuration to VRF_BLUE.

C.

Change the route-map configuration to VRF_BLUE.

Answers
D.

Change the access-list number in the route map

D.

Change the access-list number in the route map

Answers
Suggested answer: A

What is a consideration when designing a Cisco SD-Access underlay network?

A.

End user subnets and endpoints are part of the underlay network.

A.

End user subnets and endpoints are part of the underlay network.

Answers
B.

The underlay switches provide endpoint physical connectivity for users.

B.

The underlay switches provide endpoint physical connectivity for users.

Answers
C.

Static routing is a requirement,

C.

Static routing is a requirement,

Answers
D.

It must support IPv4 and IPv6 underlay networks

D.

It must support IPv4 and IPv6 underlay networks

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-designguide.html#Underlay

How is Layer 3 roaming accomplished in a unified wireless deployment?

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

Answers
B.

The client entry on the original controller is passed to the database on the new controller.

B.

The client entry on the original controller is passed to the database on the new controller.

Answers
C.

The new controller assigns an IP address from the new subnet to the client

C.

The new controller assigns an IP address from the new subnet to the client

Answers
D.

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

D.

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

Answers
Suggested answer: D

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue?

(Choose two)

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

Answers
B.

Restore the DCA default settings because this automatically avoids channel interference.

B.

Restore the DCA default settings because this automatically avoids channel interference.

Answers
C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

Answers
D.

Enable DFS channels because they are immune to radar interference.

D.

Enable DFS channels because they are immune to radar interference.

Answers
E.

Disable DFS channels to prevent interference with Doppler radar

E.

Disable DFS channels to prevent interference with Doppler radar

Answers
Suggested answer: A, E
Total 983 questions
Go to page: of 99