ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











A network administrator applies the following configuration to an IOS device.

What is the process of password checks when a login attempt is made to the device?

A.

A TACACS+server is checked first. If that check fail, a database is checked?

A.

A TACACS+server is checked first. If that check fail, a database is checked?

Answers
B.

A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.

B.

A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.

Answers
C.

A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.

C.

A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.

Answers
D.

A local database is checked first. If that check fails, a TACACS+server is checked.

D.

A local database is checked first. If that check fails, a TACACS+server is checked.

Answers
Suggested answer: D

What is the purpose of the LISP routing and addressing architecture?

A.

It creates two entries for each network node, one for Its identity and another for its location on the network.

A.

It creates two entries for each network node, one for Its identity and another for its location on the network.

Answers
B.

It allows LISP to be applied as a network visualization overlay though encapsulation.

B.

It allows LISP to be applied as a network visualization overlay though encapsulation.

Answers
C.

It allows multiple Instances of a routing table to co-exist within the same router.

C.

It allows multiple Instances of a routing table to co-exist within the same router.

Answers
D.

It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

D.

It creates head-end replication used to deliver broadcast and multicast frames to the entire network.

Answers
Suggested answer: A

How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?

A.

classifies traffic based on advanced application recognition

A.

classifies traffic based on advanced application recognition

Answers
B.

uses flexible NetFlow

B.

uses flexible NetFlow

Answers
C.

classifies traffic based on the contextual identity of the endpoint rather than its IP address correct

C.

classifies traffic based on the contextual identity of the endpoint rather than its IP address correct

Answers
D.

assigns a VLAN to the endpoint

D.

assigns a VLAN to the endpoint

Answers
Suggested answer: C

Explanation:

The Cisco TrustSec solution simplifies the provisioning and management of network access control through the use of software-defined segmentation to classify network traffic and enforce policies for more flexible access controls. Traffic classification is based on endpoint identity, not IP address, enabling policy change without net-work redesign.

Refer to the exhibit.

A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?

A.

The keepalive value is modified from the default value.

A.

The keepalive value is modified from the default value.

Answers
B.

Interface tracking is configured.

B.

Interface tracking is configured.

Answers
C.

The tunnel mode is set to the default.

C.

The tunnel mode is set to the default.

Answers
D.

The physical interface MTU is 1476 bytes.

D.

The physical interface MTU is 1476 bytes.

Answers
Suggested answer: C

"HTTP/1.1 204 content" is returned when cur –I –x delete command is issued. Which situation hasoccurred?

A.

The object could not be located at the URI path.

A.

The object could not be located at the URI path.

Answers
B.

The command succeeded in deleting the object

B.

The command succeeded in deleting the object

Answers
C.

The object was located at the URI, but it could not be deleted.

C.

The object was located at the URI, but it could not be deleted.

Answers
D.

The URI was invalid

D.

The URI was invalid

Answers
Suggested answer: B

Explanation:

HTTP Status 204 (No Content) indicates that the server has successfully fulfilled the request and thatthere is no content to send in the response payload body.

A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?

A.

Layer 2 access

A.

Layer 2 access

Answers
B.

three-tier

B.

three-tier

Answers
C.

two-tier

C.

two-tier

Answers
D.

routed access

D.

routed access

Answers
Suggested answer: C

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

A.

Not all of the controllers in the mobility group are using the same mobility group name.

A.

Not all of the controllers in the mobility group are using the same mobility group name.

Answers
B.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

B.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

Answers
C.

All of the controllers within the mobility group are using the same virtual interface IP address.

C.

All of the controllers within the mobility group are using the same virtual interface IP address.

Answers
D.

All of the controllers in the mobility group are using the same mobility group name.

D.

All of the controllers in the mobility group are using the same mobility group name.

Answers
Suggested answer: B

What is the differences between TCAM and the MAC address table?

A.

The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

A.

The MAC address table is contained in CAM ACL and QoS information is stored in TCAM

Answers
B.

The MAC address table supports partial matches. TCAM requires an exact match

B.

The MAC address table supports partial matches. TCAM requires an exact match

Answers
C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

C.

Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.

Answers
D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

D.

TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables

Answers
Suggested answer: A

Explanation:

https://community.cisco.com/t5/networking-documents/cam-content-addressable-memory-vstcam-ternary-content/ta-p/3107938When using Ternary Content Addressable Memory (TCAM) inside routers it's used for faster addresslookup that enables fast routing.

In switches Content Addressable Memory (CAM) is used for building and lookup of mac address table that enables L2 forwarding decisions.

Besides Longest-Prefix Matching, TCAM in today's routers and multilayer Switch devices are used to store ACL, QoS and other things from upper-layer processing.

Which exhibit displays a valid JSON file?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?

A.

container

A.

container

Answers
B.

Type 1 hypervisor

B.

Type 1 hypervisor

Answers
C.

hardware pass-thru

C.

hardware pass-thru

Answers
D.

Type 2 hypervisor

D.

Type 2 hypervisor

Answers
Suggested answer: D

Explanation:

In contrast to type 1 hypervisor, a type 2 hypervisor (or hosted hypervisor) runs on top of an operating system and not the physical hardware directly. A big advantage of Type 2 hypervisors is that management console software is not required. Examples of type 2 hypervisor are VMware Workstation (which can run on Windows, Mac and Linux) or Microsoft Virtual PC (only runs on Windows).

Total 983 questions
Go to page: of 99