ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 18

List of questions

Question 171

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 171 115470 10102024232942000000

SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?


Cisco 350-401 image Question 171 Answer 1 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 1 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 2 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 2 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 3 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 3 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 4 115470 10102024232942000000


Cisco 350-401 image Question 171 Answer 4 115470 10102024232942000000

Suggested answer: D
asked 10/10/2024
Tillmon, Quinton
41 questions

Question 172

Report Export Collapse

An engineer configures HSRP group 37. The configuration does not modify the default virtual MAC address. Which virtual MAC address does the group use?

C0:00:00:25:00:00

C0:00:00:25:00:00

00:00:0c:07:ac:37

00:00:0c:07:ac:37

C0:39:83:25:258:5

C0:39:83:25:258:5

00:00:0c:07:ac:25

00:00:0c:07:ac:25

Suggested answer: D
asked 10/10/2024
Venkataramanan R
42 questions

Question 173

Report Export Collapse

An engineer has deployed a single Cisco 5520 WLC with a management IP address of 172.16.50.5/24.

The engineer must register 50 new Cisco AIR-CAP2802I-E-K9 access points to the WLC using DHCP option 43. The access points are connected to a switch in VLAN 100 that uses the 172.16.100.0/24 subnet. The engineer has configured the DHCP scope on the switch as follows:

Cisco 350-401 image Question 173 115472 10102024232942000000

The access points are failing to join the wireless LAN controller. Which action resolves the issue?

configure option 43 Hex F104.AC10.3205

configure option 43 Hex F104.AC10.3205

configure option 43 Hex F104.CA10.3205

configure option 43 Hex F104.CA10.3205

configure dns-server 172.16.50.5

configure dns-server 172.16.50.5

configure dns-server 172.16.100.1

configure dns-server 172.16.100.1

Suggested answer: A
Explanation:

The Option 43 hexadecimal string is assembled as a sequence of the TLV values for the Option 43 suboption: Type + Length + Value. Type is always the suboption code 0xf1. Length is the number of controller management IP addresses times 4 in hex. Value is the IP address of the controller listed sequentially in hex.

On this question, there is 1 controller with management interface IP addresses 172.16.50.5/24. The type is 0xf1. The length is 1 * 4 = 8 = 0x04. The mgmt IP addresses 172.16.50.5 translate to ac.10.32.05 (0xac103205). When the string is assembled, it yields f108c0a80a05c0a80a14. The Cisco IOS command that is added to the DHCP scope is: option 43 hex f104ac103205

asked 10/10/2024
Anthony Bradley
48 questions

Question 174

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 174 115473 10102024232942000000

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Suggested answer: C, D
asked 10/10/2024
Paul Macinic
36 questions

Question 175

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 175 115474 10102024232942000000

Which action resolves the EtherChannel issue between SW2 and SW3?

Configure switchport mode trunk on SW2.

Configure switchport mode trunk on SW2.

Configure switchport nonegotiate on SW3

Configure switchport nonegotiate on SW3

Configure channel-group 1 mode desirable on both interfaces.

Configure channel-group 1 mode desirable on both interfaces.

Configure channel-group 1 mode active on both interfaces.

Configure channel-group 1 mode active on both interfaces.

Suggested answer: D
asked 10/10/2024
Adam Burdett
39 questions

Question 176

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 176 115475 10102024232942000000

Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?

standby 2 priority

standby 2 priority

standby 2 preempt

standby 2 preempt

standby 2 track

standby 2 track

standby 2 timers

standby 2 timers

Suggested answer: B
asked 10/10/2024
Kamal maru
45 questions

Question 177

Report Export Collapse

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?

Cisco Firepower and FireSIGHT

Cisco Firepower and FireSIGHT

Cisco Stealth watch system

Cisco Stealth watch system

Advanced Malware Protection

Advanced Malware Protection

Cisco Web Security Appliance

Cisco Web Security Appliance

Suggested answer: B
asked 10/10/2024
Tina Christiansen
33 questions

Question 178

Report Export Collapse

Cisco 350-401 image Question 178 115477 10102024232942000000


Refer to the exhibit. An engineer configures CoPP and enters the show command to verify the implementation. What is the result of the configuration?

All traffic will be policed based on access-list 120.

All traffic will be policed based on access-list 120.

If traffic exceeds the specified rate, it will be transmitted and remarked.

If traffic exceeds the specified rate, it will be transmitted and remarked.

Class-default traffic will be dropped.

Class-default traffic will be dropped.

ICMP will be denied based on this configuration.

ICMP will be denied based on this configuration.

Suggested answer: A
asked 10/10/2024
Nicoleta Moglan
40 questions

Question 179

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 179 115478 10102024232942000000

What is the result when a switch that is running PVST+ is added to this network?

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

DSW2 operates in Rapid PVST+ and the new switch operates in PVST+

Both switches operate in the PVST+ mode

Both switches operate in the PVST+ mode

Spanning tree is disabled automatically on the network

Spanning tree is disabled automatically on the network

Both switches operate in the Rapid PVST+ mode.

Both switches operate in the Rapid PVST+ mode.

Suggested answer: A
Explanation:

From the output we see DSW2 is running in RSTP mode (in fact Rapid PVST+ mode as Cisco does not support RSTP alone). When a new switch running PVST+ mode is added to the topology, they keep running the old STP instances as

RSTP (in fact Rapid PVST+) is compatible with PVST+.

asked 10/10/2024
Roberto Recine
52 questions

Question 180

Report Export Collapse

Cisco 350-401 image Question 180 115479 10102024232942000000

Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?

permit host 172.16.0.2 host 192.168.0.5 eq 8080

permit host 172.16.0.2 host 192.168.0.5 eq 8080

permit host 192.168.0.5 host 172.16.0.2 eq 8080

permit host 192.168.0.5 host 172.16.0.2 eq 8080

permit host 192.168.0.5 eq 8080 host 172.16.0.2

permit host 192.168.0.5 eq 8080 host 172.16.0.2

permit host 192.168.0.5 it 8080 host 172.16.0.2

permit host 192.168.0.5 it 8080 host 172.16.0.2

Suggested answer: C
Explanation:

The inbound direction of G0/0 of SW2 only filter traffic from Web Server to PC-1 so the source IP address and port is of the Web Server.

asked 10/10/2024
Ibrahim SACCA
42 questions
Total 983 questions
Go to page: of 99
Search

Related questions