ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 10

Add to Whishlist

List of questions

Question 91

Report Export Collapse

How is 802.11 traffic handled in a fabric-enabled SSID?

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLC

converted by the AP into 802.3 and encapsulated into VXLAN

converted by the AP into 802.3 and encapsulated into VXLAN

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

centrally switched back to WLC where the user traffic is mapped to a VLAN on the WLC

converted by the AP into 802.3 and encapsulated into a VLAN

converted by the AP into 802.3 and encapsulated into a VLAN

Suggested answer: B
asked 10/10/2024
Bouchtig, Yassine
45 questions

Question 92

Report Export Collapse

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

SNR

SNR

Noise

Noise

RSSI

RSSI

CCI

CCI

Suggested answer: A
asked 10/10/2024
Chrysovalantis Oikonomopoulos
41 questions

Question 93

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 93 115392 10102024232942000000

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24.

The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet.

Which of this behavior is true?

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.

Only standard access control lists can block traffic from a source IP address.

Only standard access control lists can block traffic from a source IP address.

After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.

After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.

The access control list must contain an explicit deny to block traffic from the router.

The access control list must contain an explicit deny to block traffic from the router.

Suggested answer: A
asked 10/10/2024
muhammad ikram
35 questions

Question 94

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 94 115393 10102024232942000000

A network engineer is configuring OSPF between router R1 and router R2. The engineer must ensure that a DR/BDR election does not occur on the Gigabit Ethernet interfaces in area 0. Which configuration set accomplishes this goal?


Cisco 350-401 image Question 94 Answer 1 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 1 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 2 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 2 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 3 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 3 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 4 115393 10102024232942000000


Cisco 350-401 image Question 94 Answer 4 115393 10102024232942000000

Suggested answer: A
Explanation:

Broadcast and Non-Broadcast networks elect DR/BDR while Point-topoint/ multipoint do not elect DR/BDR. Therefore we have to set the two Gi0/0 interfaces to point-to-point or point-to-multipoint network to ensure that a DR/BDR election does not occur.

asked 10/10/2024
nico farina
47 questions

Question 95

Report Export Collapse

Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?

least privilege

least privilege

fail-safe defaults

fail-safe defaults

economy of mechanism

economy of mechanism

complete mediation

complete mediation

Suggested answer: B
asked 10/10/2024
Andres Romo
50 questions

Question 96

Report Export Collapse

How does an on-premises infrastructure compare to a cloud infrastructure?

On-premises can increase compute power faster than cloud

On-premises can increase compute power faster than cloud

On-premises requires less power and cooling resources than cloud

On-premises requires less power and cooling resources than cloud

On-premises offers faster deployment than cloud

On-premises offers faster deployment than cloud

On-premises offers lower latency for physically adjacent systems than cloud.

On-premises offers lower latency for physically adjacent systems than cloud.

Suggested answer: D
asked 10/10/2024
GUY XAVIER DONGMO FAPONG
44 questions

Question 97

Report Export Collapse

Cisco 350-401 image Question 97 115396 10102024232942000000

Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?

Change the access-list destination mask to a wildcard.

Change the access-list destination mask to a wildcard.

Change the source network that Is specified in access-list 101.

Change the source network that Is specified in access-list 101.

Change the route-map configuration to VRF_BLUE.

Change the route-map configuration to VRF_BLUE.

Change the access-list number in the route map

Change the access-list number in the route map

Suggested answer: A
asked 10/10/2024
sailakshmi KM
47 questions

Question 98

Report Export Collapse

What is a consideration when designing a Cisco SD-Access underlay network?

End user subnets and endpoints are part of the underlay network.

End user subnets and endpoints are part of the underlay network.

The underlay switches provide endpoint physical connectivity for users.

The underlay switches provide endpoint physical connectivity for users.

Static routing is a requirement,

Static routing is a requirement,

It must support IPv4 and IPv6 underlay networks

It must support IPv4 and IPv6 underlay networks

Suggested answer: B
Explanation:

https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-designguide.html#Underlay

asked 10/10/2024
Rowan Cele
51 questions

Question 99

Report Export Collapse

How is Layer 3 roaming accomplished in a unified wireless deployment?

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.

The client entry on the original controller is passed to the database on the new controller.

The client entry on the original controller is passed to the database on the new controller.

The new controller assigns an IP address from the new subnet to the client

The new controller assigns an IP address from the new subnet to the client

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.

Suggested answer: D
asked 10/10/2024
chris bezuidenhout
42 questions

Question 100

Report Export Collapse

A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WI-FI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue?

(Choose two)

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list

Restore the DCA default settings because this automatically avoids channel interference.

Restore the DCA default settings because this automatically avoids channel interference.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only

Enable DFS channels because they are immune to radar interference.

Enable DFS channels because they are immune to radar interference.

Disable DFS channels to prevent interference with Doppler radar

Disable DFS channels to prevent interference with Doppler radar

Suggested answer: A, E
asked 10/10/2024
Guus Schenkelaars
35 questions
Total 983 questions
Go to page: of 99

Related questions