Cisco 350-401 Practice Test - Questions Answers, Page 16
List of questions
Related questions
A network administrator applies the following configuration to an IOS device.
What is the process of password checks when a login attempt is made to the device?
A TACACS+server is checked first. If that check fail, a database is checked?
A TACACS+server is checked first. If that check fail, a RADIUS server is checked. If that check fail. a local database is checked.
A local database is checked first. If that fails, a TACACS+server is checked, if that check fails, a RADUIS server is checked.
A local database is checked first. If that check fails, a TACACS+server is checked.
What is the purpose of the LISP routing and addressing architecture?
It creates two entries for each network node, one for Its identity and another for its location on the network.
It allows LISP to be applied as a network visualization overlay though encapsulation.
It allows multiple Instances of a routing table to co-exist within the same router.
It creates head-end replication used to deliver broadcast and multicast frames to the entire network.
How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?
classifies traffic based on advanced application recognition
uses flexible NetFlow
classifies traffic based on the contextual identity of the endpoint rather than its IP address correct
assigns a VLAN to the endpoint
Refer to the exhibit.
A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?
The keepalive value is modified from the default value.
Interface tracking is configured.
The tunnel mode is set to the default.
The physical interface MTU is 1476 bytes.
"HTTP/1.1 204 content" is returned when cur –I –x delete command is issued. Which situation hasoccurred?
The object could not be located at the URI path.
The command succeeded in deleting the object
The object was located at the URI, but it could not be deleted.
The URI was invalid
A company plans to implement intent-based networking in its campus infrastructure. Which design facilities a migrate from a traditional campus design to a programmer fabric designer?
Layer 2 access
three-tier
two-tier
routed access
When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?
Not all of the controllers in the mobility group are using the same mobility group name.
Not all of the controllers within the mobility group are using the same virtual interface IP address.
All of the controllers within the mobility group are using the same virtual interface IP address.
All of the controllers in the mobility group are using the same mobility group name.
What is the differences between TCAM and the MAC address table?
The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
The MAC address table supports partial matches. TCAM requires an exact match
Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
Which exhibit displays a valid JSON file?
Option A
Option B
Option C
Option D
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?
container
Type 1 hypervisor
hardware pass-thru
Type 2 hypervisor
Question