Cisco 350-401 Practice Test - Questions Answers, Page 17
List of questions
Question 161

Refer to the exhibit.
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?
The source-interface is configured incorrectly.
The destination must be 172.30.30.2 for icmp-echo
The default route is missing the track feature
The threshold value is wrong.
The last command should be "R1(config)#ip route 0.0.0.0 0.0.0.0 172.20.20.2 track 10".
Question 162

If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
15
1.2
-165
.83
Question 163

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.
action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"
action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"
action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"
action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"
Question 164

Which two mechanisms are available to secure NTP? (Choose two.)
IP prefix list-based
IPsec
TACACS-based authentication
IP access list-based
Encrypted authentication
Question 165

What is the difference between CEF and process switching?
CEF processes packets that are too complex for process switching to manage.
CEF is more CPU-intensive than process switching.
CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.
Process switching is faster than CEF.
Question 166

Which AP mode allows an engineer to scan configured channels for rogue access points?
sniffer
monitor
bridge
local
Question 167

What is a characteristic of MACsec?
802.1AE provides encryption and authentication services
802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session
802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)
802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol
MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-ofband methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys. MKA and MACsec are implemented after successful authentication using the 802.1x Extensible Authentication Protocol (EAP-TLS) or Pre Shared Key (PSK) framework.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-9/configuration_guide/sec/b_169_sec_9300_cg/macsec_encryption.html
Question 168

Which method should an engineer use to deal with a long-standing contention issue between any two VMs on the same host?
Adjust the resource reservation limits
Live migrate the VM to another host
Reset the VM
Reset the host
Question 169

Refer to the exhibit.
The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.
Configure the channel-group mode on SW3 Gi0/1 to active
Configure the mode on SW2 Gi0/0 to trunk
Configure the mode on SW2 Gi0/1 to access.
Question 170

Refer to the exhibit. Which action completes the configuration to achieve a dynamic continuous mapped NAT for all users?
Configure a match-host type NAT pool
Reconfigure the pool to use the 192.168 1 0 address range
Increase the NAT pool size to support 254 usable addresses
Configure a one-to-one type NAT pool
Question