ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 16

List of questions

Question 151

Report Export Collapse

A network administrator applies the following configuration to an IOS device.

Cisco 350-401 image Question 151 115450 10102024232942000000

What is the process of password checks when a login attempt is made to the device?

A TACACS+server is checked first. If that check fail, a database is checked?

A TACACS+server is checked first. If that check fail, a database is checked?

A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.

A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.

A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.

A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.

A local database is checked first. If that check fails, a TACACS+server is checked.

A local database is checked first. If that check fails, a TACACS+server is checked.

Suggested answer: D
asked 10/10/2024
Seth Frizzell
43 questions

Question 152

Report Export Collapse

What is the purpose of the LISP routing and addressing architecture?

It creates two entries for each network node, one for Its identity and another for its location on the network.

It creates two entries for each network node, one for Its identity and another for its location on the network.

It allows LISP to be applied as a network visualization overlay though encapsulation.

It allows LISP to be applied as a network visualization overlay though encapsulation.

It allows multiple Instances of a routing table to co-exist within the same router.

It allows multiple Instances of a routing table to co-exist within the same router.

It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

Suggested answer: A
asked 10/10/2024
Veacheslav Stasiuc
38 questions

Question 153

Report Export Collapse

How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?

classifies traffic based on advanced application recognition

classifies traffic based on advanced application recognition

uses flexible NetFlow

uses flexible NetFlow

classifies traffic based on the contextual identity of the endpoint rather than its IP address correct

classifies traffic based on the contextual identity of the endpoint rather than its IP address correct

assigns a VLAN to the endpoint

assigns a VLAN to the endpoint

Suggested answer: C
Explanation:

The Cisco TrustSec solution simplifies the provisioning and management of network access control through the use of software-defined segmentation to classify network traffic and enforce policies for more flexible access controls. Traffic classification is based on endpoint identity, not IP address, enabling policy change without net-work redesign.

asked 10/10/2024
Malik Spamu
46 questions

Question 154

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 154 115453 10102024232942000000

A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?

The keepalive value is modified from the default value.

The keepalive value is modified from the default value.

Interface tracking is configured.

Interface tracking is configured.

The tunnel mode is set to the default.

The tunnel mode is set to the default.

The physical interface MTU is 1476 bytes.

The physical interface MTU is 1476 bytes.

Suggested answer: C
asked 10/10/2024
Yuriy Kitsis
38 questions

Question 155

Report Export Collapse

"HTTP/1.1 204 content" is returned when cur –I –x delete command is issued. Which situation hasoccurred?

The object could not be located at the URI path.

The object could not be located at the URI path.

The command succeeded in deleting the object

The command succeeded in deleting the object

The object was located at the URI, but it could not be deleted.

The object was located at the URI, but it could not be deleted.

The URI was invalid

The URI was invalid

Suggested answer: B
Explanation:

HTTP Status 204 (No Content) indicates that the server has successfully fulfilled the request and thatthere is no content to send in the response payload body.

asked 10/10/2024
Mithun E
54 questions

Question 156

Report Export Collapse

A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?

Layer 2 access

Layer 2 access

three-tier

three-tier

two-tier

two-tier

routed access

routed access

Suggested answer: C
asked 10/10/2024
CLINTON PLESS
45 questions

Question 157

Report Export Collapse

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

Not all of the controllers in the mobility group are using the same mobility group name.

Not all of the controllers in the mobility group are using the same mobility group name.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

All of the controllers within the mobility group are using the same virtual interface IP address.

All of the controllers within the mobility group are using the same virtual interface IP address.

All of the controllers in the mobility group are using the same mobility group name.

All of the controllers in the mobility group are using the same mobility group name.

Suggested answer: B
asked 10/10/2024
John Reynolds
33 questions

Question 158

Report Export Collapse

What is the differences between TCAM and the MAC address table?

The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

The MAC address table supports partial matches. TCAM requires an exact match

The MAC address table supports partial matches. TCAM requires an exact match

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Suggested answer: A
Explanation:

https://community.cisco.com/t5/networking-documents/cam-content-addressable-memory-vstcam-ternary-content/ta-p/3107938When using Ternary Content Addressable Memory (TCAM) inside routers it's used for faster addresslookup that enables fast routing.

In switches Content Addressable Memory (CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.

Besides Longest-Prefix Matching, TCAM in today's routers and multilayer Switch devices are used to store ACL, QoS and other things from upper-layer processing.

asked 10/10/2024
Alfred Macaraeg
51 questions

Question 159

Report Export Collapse

Which exhibit displays a valid JSON file?

Cisco 350-401 image Question 159 115458 10102024232942000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: D
asked 10/10/2024
Sergio Quintero Angel
43 questions

Question 160

Report Export Collapse

A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?

container

container

Type 1 hypervisor

Type 1 hypervisor

hardware pass-thru

hardware pass-thru

Type 2 hypervisor

Type 2 hypervisor

Suggested answer: D
Explanation:

In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required. Examples of type 2 hypervisor are VMware Workstation (which can run on Windows, Mac and Linux) or Microsoft Virtual PC (only runs on Windows).

asked 10/10/2024
Venkatesh Ampolu
45 questions
Total 983 questions
Go to page: of 99

Related questions