ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 15

List of questions

Question 141

Report Export Collapse

Where is radio resource management performed in a cisco SD-access wireless solution?

DNA Center

DNA Center

control plane node

control plane node

wireless controller

wireless controller

Cisco CMX

Cisco CMX

Suggested answer: C
Explanation:

Fabric wireless controllers manage and control the fabric-mode APs using the same general model as the traditional local-mode controllers which offers the same operational advantages such as mobility control and radio resource management. A significant difference is that client traffic from wireless endpoints is not tunnelled from the APs to the wireless controller. Instead, communication from wireless clients is encapsulated in VXLAN by the fabric APs which build a tunnel to their first-hop fabric edge node. Wireless traffic it tunneled to the edge nodes as the edge nodes provide fabric services such as the Layer 3 Anycast Gateway, policy, and traffic enforcement.

https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html

asked 10/10/2024
Nazarii Bybyk
38 questions

Question 142

Report Export Collapse

How does EIGRP differ from OSPF?

EIGRP is more prone to routing loops than OSPF

EIGRP is more prone to routing loops than OSPF

EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.

EIGRP supports equal or unequal path cost, and OSPF supports only equal path cost.

EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors

EIGRP has a full map of the topology, and OSPF only knows directly connected neighbors

EIGRP uses more CPU and memory than OSPF

EIGRP uses more CPU and memory than OSPF

Suggested answer: B
asked 10/10/2024
William Takashi Chan
37 questions

Question 143

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 143 115442 10102024232942000000

Which HTTP JSON response does the python code output give?

NameError: name 'json' is not defined

NameError: name 'json' is not defined

KeyError 'kickstart_ver_str'

KeyError 'kickstart_ver_str'

7.61

7.61

7.0(3)I7(4)

7.0(3)I7(4)

Suggested answer: D
asked 10/10/2024
Tebogo Maphafo
39 questions

Question 144

Report Export Collapse

Cisco 350-401 image Question 144 115443 10102024232942000000


Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the issue? (Choose two)

configure switchport mode access on SW2

configure switchport mode access on SW2

configure switchport nonegotiate on SW2

configure switchport nonegotiate on SW2

configure switchport mode trunk on SW2

configure switchport mode trunk on SW2

configure switchport nonegotiate on SW1

configure switchport nonegotiate on SW1

configure switchport mode dynamic desirable on SW2

configure switchport mode dynamic desirable on SW2

Suggested answer: C, E
asked 10/10/2024
Javier Rodriguez
43 questions

Question 145

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 145 115444 10102024232942000000

An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?

The destination server reported it is too busy

The destination server reported it is too busy

The protocol is unreachable

The protocol is unreachable

The destination port is unreachable

The destination port is unreachable

The probe timed out

The probe timed out

Suggested answer: D
Explanation:

In Cisco routers, the codes for a traceroute command reply are:

! - success

* - time out

N - network unreachable

H - host unreachable

P - protocol unreachable

A - admin denied

Q - source quench received (congestion)

? - unknown (any other ICMP message)In Cisco routers, the codes for a traceroute command reply are:

! - success

* - time out

N - network unreachable

H - host unreachable

P - protocol unreachable

A - admin denied

Q - source quench received (congestion)

? - unknown (any other ICMP message)

asked 10/10/2024
Shirish Astagikar
46 questions

Question 146

Report Export Collapse

Which device makes the decision for a wireless client to roam?

wireless client

wireless client

wireless LAN controller

wireless LAN controller

access point

access point

WCS location server

WCS location server

Suggested answer: A
asked 10/10/2024
Patrick Herrington
43 questions

Question 147

Report Export Collapse

How is MSDP used to interconnect multiple PIM-SM domains?

MSDP depends on BGP or multiprotocol BGP for mterdomam operation

MSDP depends on BGP or multiprotocol BGP for mterdomam operation

MSDP SA request messages are used to request a list of active sources for a specific group

MSDP SA request messages are used to request a list of active sources for a specific group

SDP allows a rendezvous point to dynamically discover active sources outside of its domain

SDP allows a rendezvous point to dynamically discover active sources outside of its domain

MSDP messages are used to advertise active sources in a domain

MSDP messages are used to advertise active sources in a domain

Suggested answer: A
asked 10/10/2024
Frantisek Kohanyi Kohanyi
44 questions

Question 148

Report Export Collapse

Cisco 350-401 image Question 148 115447 10102024232942000000

Refer to the exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?

The password expiry mechanism is on the AAA server and must be configured there.

The password expiry mechanism is on the AAA server and must be configured there.

Add the aaa authentication enable default Administrators command.

Add the aaa authentication enable default Administrators command.

Add the username admin privilege 15 common-criteria*policy Administrators password 0 Cisco13579! command.

Add the username admin privilege 15 common-criteria*policy Administrators password 0 Cisco13579! command.

No further action Is required. The configuration is complete.

No further action Is required. The configuration is complete.

Suggested answer: C
Explanation:

Perform this task to create a password security policy and to apply the policy to a specific user profile.

Device> enable

Device# configure terminal

Device(config)# aaa new-model

Device(config)# aaa common-criteria policy policy1

Device(config-cc-policy)# char-changes 4

Device(config-cc-policy)# max-length 20

Device(config-cc-policy)# min-length 6

Device(config-cc-policy)# numeric-count 2

Device(config-cc-policy)# special-case 2

Device(config-cc-policy)# exit

Device(config)# username user1 common-criteria-policy policy1 password password1 Device(config)# end

asked 10/10/2024
Test Test
30 questions

Question 149

Report Export Collapse

Which action is the vSmart controller responsible for in an SD-WAN deployment?

handle, maintain, and gather configuration and status for nodes within the SD-WAN fabric

handle, maintain, and gather configuration and status for nodes within the SD-WAN fabric

distribute policies that govern data forwarding performed within the SD-WAN fabric

distribute policies that govern data forwarding performed within the SD-WAN fabric

gather telemetry data from vEdge routers

gather telemetry data from vEdge routers

onboard vEdge nodes into the SD-WAN fabric

onboard vEdge nodes into the SD-WAN fabric

Suggested answer: B
asked 10/10/2024
Kristian Gutierrez
51 questions

Question 150

Report Export Collapse

What is the function of the LISP map resolver?

to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable ElDs as packet sources

to send traffic to non-LISP sites when connected to a service provider that does not accept nonroutable ElDs as packet sources

to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages

to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings for the site, and respond to map-request messages

to decapsulate map-request messages from ITRs and forward the messages to the MS.

to decapsulate map-request messages from ITRs and forward the messages to the MS.

to advertise routable non-LISP traffic from one address family to LISP sites in a different address family

to advertise routable non-LISP traffic from one address family to LISP sites in a different address family

Suggested answer: C
Explanation:

Map resolver (MR): The MR performs the following functions: Receives MAP requests, which are encapsulated by ITRs. Provides a service interface to the ALT router, de-encapsulates MAP requests, and forwards on the ALT topology.

asked 10/10/2024
Michel Flipse
45 questions
Total 983 questions
Go to page: of 99

Related questions