Cisco 350-401 Practice Test - Questions Answers, Page 16
List of questions
Question 151

A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
A TACACS+server is checked first. If that check fail, a database is checked?
A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.
A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.
A local database is checked first. If that check fails, a TACACS+server is checked.
Question 152

What is the purpose of the LISP routing and addressing architecture?
It creates two entries for each network node, one for Its identity and another for its location on the network.
It allows LISP to be applied as a network visualization overlay though encapsulation.
It allows multiple Instances of a routing table to co-exist within the same router.
It creates head-end replication used to deliver broadcast and multicast frames to the entire network.
Question 153

How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?
classifies traffic based on advanced application recognition
uses flexible NetFlow
classifies traffic based on the contextual identity of the endpoint rather than its IP address correct
assigns a VLAN to the endpoint
The Cisco TrustSec solution simplifies the provisioning and management of network access control through the use of software-defined segmentation to classify network traffic and enforce policies for more flexible access controls. Traffic classification is based on endpoint identity, not IP address, enabling policy change without net-work redesign.
Question 154

Refer to the exhibit.
A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?
The keepalive value is modified from the default value.
Interface tracking is configured.
The tunnel mode is set to the default.
The physical interface MTU is 1476 bytes.
Question 155

"HTTP/1.1 204 content" is returned when cur –I –x delete command is issued. Which situation hasoccurred?
The object could not be located at the URI path.
The command succeeded in deleting the object
The object was located at the URI, but it could not be deleted.
The URI was invalid
HTTP Status 204 (No Content) indicates that the server has successfully fulfilled the request and thatthere is no content to send in the response payload body.
Question 156

A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?
Layer 2 access
three-tier
two-tier
routed access
Question 157

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Not all of the controllers in the mobility group are using the same mobility group name.
Not all of the controllers within the mobility group are using the same virtual interface IP address.
All of the controllers within the mobility group are using the same virtual interface IP address.
All of the controllers in the mobility group are using the same mobility group name.
Question 158

What is the differences between TCAM and the MAC address table?
The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
The MAC address table supports partial matches. TCAM requires an exact match
Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
https://community.cisco.com/t5/networking-documents/cam-content-addressable-memory-vstcam-ternary-content/ta-p/3107938When using Ternary Content Addressable Memory (TCAM) inside routers it's used for faster addresslookup that enables fast routing.
In switches Content Addressable Memory (CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.
Besides Longest-Prefix Matching, TCAM in today's routers and multilayer Switch devices are used to store ACL, QoS and other things from upper-layer processing.
Question 159

Which exhibit displays a valid JSON file?
Option A
Option B
Option C
Option D
Question 160

A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
container
Type 1 hypervisor
hardware pass-thru
Type 2 hypervisor
In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required. Examples of type 2 hypervisor are VMware Workstation (which can run on Windows, Mac and Linux) or Microsoft Virtual PC (only runs on Windows).
Question