ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 14

Question list
Search
Search

Related questions











What are two benefits of virtual switching when compared to hardware switching? (Choose two.)

A.

increased MTU size

A.

increased MTU size

Answers
B.

hardware independence

B.

hardware independence

Answers
C.

VM-level isolation

C.

VM-level isolation

Answers
D.

increased flexibility

D.

increased flexibility

Answers
E.

extended 802.1Q VLAN range

E.

extended 802.1Q VLAN range

Answers
Suggested answer: C, D

which entity is a Type 1 hypervisor?

A.

Oracle VM VirtualBox

A.

Oracle VM VirtualBox

Answers
B.

VMware server

B.

VMware server

Answers
C.

Citrix XenServer

C.

Citrix XenServer

Answers
D.

Microsoft Virtual PC

D.

Microsoft Virtual PC

Answers
Suggested answer: C

Refer to the exhibit How was spanning-tree configured on this interface?

A.

By entering the command spanning-tree portfast trunk in the interface configuration mode.

A.

By entering the command spanning-tree portfast trunk in the interface configuration mode.

Answers
B.

By entering the command spanning-tree portfast in the interface configuration mode

B.

By entering the command spanning-tree portfast in the interface configuration mode

Answers
C.

By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode

C.

By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode

Answers
D.

By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

D.

By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode

Answers
Suggested answer: A

What is a characteristic of a next-generation firewall?

A.

only required at the network perimeter

A.

only required at the network perimeter

Answers
B.

required in each layer of the network

B.

required in each layer of the network

Answers
C.

filters traffic using Layer 3 and Layer 4 information only

C.

filters traffic using Layer 3 and Layer 4 information only

Answers
D.

provides intrusion prevention

D.

provides intrusion prevention

Answers
Suggested answer: D

Explanation:

The feature set for NGFWs build upon traditional firewall features by including critical security functions like intrusion prevention, VPN, and anti-virus, and even encrypted web traffic inspection to help prevent packets containing malicious content from entering the network

which features does Cisco EDR use to provide threat detection and response protection?

A.

containment, threat intelligence, and machine learning

A.

containment, threat intelligence, and machine learning

Answers
B.

firewalling and intrusion prevention

B.

firewalling and intrusion prevention

Answers
C.

container-based agents

C.

container-based agents

Answers
D.

cloud analysis and endpoint firewall controls

D.

cloud analysis and endpoint firewall controls

Answers
Suggested answer: B

Refer to the exhibit.

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplish task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

R3 advertises BGP updates to R1 with multiple AS 100 so R3 believes the path to reach AS 200 via R3 is farther than R2 so R3 will choose R2 to forward traffic to AS 200.

Refer to Exhibit.

MTU has been configured on the underlying physical topology, and no MTU command has been configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to host Y, assuming the DF bit is cleared?

A.

The packet arrives on router C without fragmentation.

A.

The packet arrives on router C without fragmentation.

Answers
B.

The packet is discarded on router A

B.

The packet is discarded on router A

Answers
C.

The packet is discarded on router B

C.

The packet is discarded on router B

Answers
D.

The packet arrives on router C fragmented.

D.

The packet arrives on router C fragmented.

Answers
Suggested answer: D

What is one benefit of implementing a VSS architecture?

A.

It provides multiple points of management for redundancy and improved support

A.

It provides multiple points of management for redundancy and improved support

Answers
B.

It uses GLBP to balance traffic between gateways.

B.

It uses GLBP to balance traffic between gateways.

Answers
C.

It provides a single point of management for improved efficiency.

C.

It provides a single point of management for improved efficiency.

Answers
D.

It uses a single database to manage configuration for multiple switches

D.

It uses a single database to manage configuration for multiple switches

Answers
Suggested answer: C

Explanation:

Support Virtual Switching System (VSS) to provide resiliency, and increased operational efficiency with a single point of management; VSS increases operational efficiency by simplifying the network, reducing switch management overhead by at least 50 percent. – Single configuration file and node to manage. Removes the need to configure redundant switches twice with identical policies.

What does Call Admission Control require the client to send in order to reserve the bandwidth?

A.

SIP flow information

A.

SIP flow information

Answers
B.

Wi-Fi multimedia

B.

Wi-Fi multimedia

Answers
C.

traffic specification

C.

traffic specification

Answers
D.

VoIP media session awareness

D.

VoIP media session awareness

Answers
Suggested answer: C

Which function in handled by vManage in the cisco SD-WAN fabric?

A.

Establishes BFD sessions to test liveliness of links and nodes.

A.

Establishes BFD sessions to test liveliness of links and nodes.

Answers
B.

Distributes polices that govern data forwarding.

B.

Distributes polices that govern data forwarding.

Answers
C.

Performs remote software upgrades for WAN Edge vSmart and vBond.

C.

Performs remote software upgrades for WAN Edge vSmart and vBond.

Answers
D.

Establishes iPsec tunnels with nodes

D.

Establishes iPsec tunnels with nodes

Answers
Suggested answer: C
Total 983 questions
Go to page: of 99