ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 161 115460 10102024232942000000

After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?

The source-interface is configured incorrectly.

The source-interface is configured incorrectly.

The destination must be 172.30.30.2 for icmp-echo

The destination must be 172.30.30.2 for icmp-echo

The default route is missing the track feature

The default route is missing the track feature

The threshold value is wrong.

The threshold value is wrong.

Suggested answer: C
Explanation:

The last command should be "R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2 track 10".

asked 10/10/2024
Rozsahegyi Jozsef
38 questions

Question 162

Report Export Collapse

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?

15

15

1.2

1.2

-165

-165

.83

.83

Suggested answer: A
asked 10/10/2024
Richard lavery
43 questions

Question 163

Report Export Collapse

Cisco 350-401 image Question 163 115462 10102024232942000000

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

Suggested answer: D
asked 10/10/2024
Roberto Ramadhin
41 questions

Question 164

Report Export Collapse

Which two mechanisms are available to secure NTP? (Choose two.)

IP prefix list-based

IP prefix list-based

IPsec

IPsec

TACACS-based authentication

TACACS-based authentication

IP access list-based

IP access list-based

Encrypted authentication

Encrypted authentication

Suggested answer: D, E
asked 10/10/2024
Nick Sheremet
28 questions

Question 165

Report Export Collapse

What is the difference between CEF and process switching?

CEF processes packets that are too complex for process switching to manage.

CEF processes packets that are too complex for process switching to manage.

CEF is more CPU-intensive than process switching.

CEF is more CPU-intensive than process switching.

CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.

Process switching is faster than CEF.

Process switching is faster than CEF.

Suggested answer: C
asked 10/10/2024
Andreas Krieger
37 questions

Question 166

Report Export Collapse

Which AP mode allows an engineer to scan configured channels for rogue access points?

sniffer

sniffer

monitor

monitor

bridge

bridge

local

local

Suggested answer: B
asked 10/10/2024
Michael Aragon
36 questions

Question 167

Report Export Collapse

What is a characteristic of MACsec?

802.1AE provides encryption and authentication services

802.1AE provides encryption and authentication services

802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session

802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session

802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Suggested answer: B
Explanation:

MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-ofband methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys. MKA and MACsec are implemented after successful authentication using the 802.1x Extensible Authentication Protocol (EAP-TLS) or Pre Shared Key (PSK) framework.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-9/configuration_guide/sec/b_169_sec_9300_cg/macsec_encryption.html

asked 10/10/2024
Gofaone Ncube
47 questions

Question 168

Report Export Collapse

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?

Adjust the resource reservation limits

Adjust the resource reservation limits

Live migrate the VM to another host

Live migrate the VM to another host

Reset the VM

Reset the VM

Reset the host

Reset the host

Suggested answer: A
asked 10/10/2024
Lonely Sayi
37 questions

Question 169

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 169 115468 10102024232942000000

The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?

Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.

Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.

Configure the channel-group mode on SW3 Gi0/1 to active

Configure the channel-group mode on SW3 Gi0/1 to active

Configure the mode on SW2 Gi0/0 to trunk

Configure the mode on SW2 Gi0/0 to trunk

Configure the mode on SW2 Gi0/1 to access.

Configure the mode on SW2 Gi0/1 to access.

Suggested answer: B
asked 10/10/2024
Frank van Hout
46 questions

Question 170

Report Export Collapse

Cisco 350-401 image Question 170 115469 10102024232942000000

Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?

Configure a match-host type NAT pool

Configure a match-host type NAT pool

Reconfigure the pool to use the 192.168 1 0 address range

Reconfigure the pool to use the 192.168 1 0 address range

Increase the NAT pool size to support 254 usable addresses

Increase the NAT pool size to support 254 usable addresses

Configure a one-to-one type NAT pool

Configure a one-to-one type NAT pool

Suggested answer: C
asked 10/10/2024
Rachana Kesarkar
36 questions
Total 983 questions
Go to page: of 99

Related questions