ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

Which configuration restricts the amount of SSH that a router accepts 100 kbps?


Cisco 350-401 image Question 11 Answer 1 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 1 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 2 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 2 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 3 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 3 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 4 115310 10102024232942000000


Cisco 350-401 image Question 11 Answer 4 115310 10102024232942000000

Suggested answer: C
Explanation:

CoPP protects the route processor on network devices by treating route processor resources as a separate entity with its own ingress interface (and in some implementations, egress also). CoPP is used to police traffic that is destined to the route processor of the router such as:

+ routing protocols like OSPF, EIGRP, or BGP.

+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.

+ Network management protocols like telnet, SSH, SNMP, or RADIUS.

Cisco 350-401 image Question 11 explanation 115310 10102024232942000000

Therefore we must apply the CoPP to deal with SSH because it is in the management plane. CoPP must be put under "control-plane" command.

asked 10/10/2024
Josefa Vera Gago
43 questions

Question 12

Report Export Collapse

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

Autonomous

Autonomous

Mobility Express

Mobility Express

SD-Access wireless

SD-Access wireless

Local mode

Local mode

Suggested answer: B
asked 10/10/2024
Kevin Ross
25 questions

Question 13

Report Export Collapse

Cisco 350-401 image Question 13 115312 10102024232942000000

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?


Cisco 350-401 image Question 13 Answer 1 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 1 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 2 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 2 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 3 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 3 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 4 115312 10102024232942000000


Cisco 350-401 image Question 13 Answer 4 115312 10102024232942000000

Suggested answer: D
asked 10/10/2024
Wissam Aoun
45 questions

Question 14

Report Export Collapse

Which method of account authentication does OAuth 2.0 within REST APIs?

username/role combination

username/role combination

access tokens

access tokens

cookie authentication

cookie authentication

basic signature workflow

basic signature workflow

Suggested answer: B
Explanation:

The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens:

+ access token: sent like an API key, it allows the application to access a user's data; optionally, access tokens can expire.

+ refresh token: optionally part of an OAuth flow, refresh tokens retrieve a new access token if they have expired. OAuth2 combines Authentication and Authorization to allow more sophisticated scope and validity control.

asked 10/10/2024
Arash Farivarmoheb
47 questions

Question 15

Report Export Collapse

How does the RIB differ from the FIB?

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

Suggested answer: A
Explanation:

Cisco 350-401 image Question 15 explanation 115314 10102024232942000000

Cisco 350-401 image Question 15 explanation 115314 10102024232942000000

asked 10/10/2024
Akshi Raj
50 questions

Question 16

Report Export Collapse

A network engineer is configuring Flexible Netflow and enters these commands Sampler Netflow1 Mode random one-out-of 100 Interface fastethernet 1/0 Flow-sampler netflow1 Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

CPU and memory utilization are reduced.

CPU and memory utilization are reduced.

Only the flows of top 100 talkers are exported

Only the flows of top 100 talkers are exported

The data export flow is more secure.

The data export flow is more secure.

The number of packets to be analyzed are reduced

The number of packets to be analyzed are reduced

The accuracy of the data to be analyzed is improved

The accuracy of the data to be analyzed is improved

Suggested answer: A, D
asked 10/10/2024
Ricardo Monsalve
40 questions

Question 17

Report Export Collapse

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

efficient scalability

efficient scalability

virtualization

virtualization

storage capacity

storage capacity

supported systems

supported systems

Suggested answer: A
asked 10/10/2024
Mohamed Hany
46 questions

Question 18

Report Export Collapse

Cisco 350-401 image Question 18 115317 10102024232942000000

Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on Switch1 to achieve the following results on port fa0/1? When a device is connected, the port transitions immediately to a forwarding state.

The interface should not send or receive BPDUs.

If a BPDU is received, it continues operating normally.


Cisco 350-401 image Question 18 Answer 1 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 1 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 2 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 2 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 3 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 3 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 4 115317 10102024232942000000


Cisco 350-401 image Question 18 Answer 4 115317 10102024232942000000

Suggested answer: B
asked 10/10/2024
Sundarrajan Mugunthan
39 questions

Question 19

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 19 115318 10102024232942000000

What is the Json syntax that is formed from the data?

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

Suggested answer: B
asked 10/10/2024
Monique Canham
41 questions

Question 20

Report Export Collapse

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

Layer 3

Layer 3

inter-xTR

inter-xTR

auto anchor

auto anchor

fast roam

fast roam

Suggested answer: D
Explanation:

A fabric edge node provides onboarding and mobility services for wired users and devices (including fabric-enabled WLCs and APs) connected to the fabric. It is a LISP tunnel router (xTR) that also provides the anycast gateway, endpoint authentication, and assignment to overlay host pools (static or DHCP), as well as group-based policy enforcement (for traffic to fabric endpoints).From Cisco's guide, under SDA roaming - When a client on a fabric enabled WLAN, roams from an access point to another access point on a different access-switch, it is called Inter-xTR, like a highway.Intra is within intra is between. Like interstate highways. That's how I remember.https://www.cisco.com/c/en/us/td/docs/wireless/

controller/9800/config- guide/b_wl_16_10_cg/mobility.html

asked 10/10/2024
Jeffrey VanBemmel
42 questions
Total 983 questions
Go to page: of 99

Related questions