ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 2

Question list
Search
Search

Related questions











Which configuration restricts the amount of SSH that a router accepts 100 kbps?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Explanation:

CoPP protects the route processor on network devices by treating route processor resources as a separate entity with its own ingress interface (and in some implementations, egress also). CoPP is used to police traffic that is destined to the route processor of the router such as:

+ routing protocols like OSPF, EIGRP, or BGP.

+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.

+ Network management protocols like telnet, SSH, SNMP, or RADIUS.

Therefore we must apply the CoPP to deal with SSH because it is in the management plane. CoPP must be put under "control-plane" command.

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?

A.

Autonomous

A.

Autonomous

Answers
B.

Mobility Express

B.

Mobility Express

Answers
C.

SD-Access wireless

C.

SD-Access wireless

Answers
D.

Local mode

D.

Local mode

Answers
Suggested answer: B

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to the NewYork switch to resolve the issue?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Which method of account authentication does OAuth 2.0 within REST APIs?

A.

username/role combination

A.

username/role combination

Answers
B.

access tokens

B.

access tokens

Answers
C.

cookie authentication

C.

cookie authentication

Answers
D.

basic signature workflow

D.

basic signature workflow

Answers
Suggested answer: B

Explanation:

The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens:

+ access token: sent like an API key, it allows the application to access a user's data; optionally, access tokens can expire.

+ refresh token: optionally part of an OAuth flow, refresh tokens retrieve a new access token if they have expired. OAuth2 combines Authentication and Authorization to allow more sophisticated scope and validity control.

How does the RIB differ from the FIB?

A.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

A.

The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.

Answers
B.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

B.

The FIB includes many routes a single destination. The RIB is the best route to a single destination.

Answers
C.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

C.

The RIB includes many routes to the same destination prefix. The FIB contains only the best route

Answers
D.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

D.

The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network destinations.

Answers
Suggested answer: A

Explanation:

A network engineer is configuring Flexible Netflow and enters these commands Sampler Netflow1 Mode random one-out-of 100 Interface fastethernet 1/0 Flow-sampler netflow1 Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)

A.

CPU and memory utilization are reduced.

A.

CPU and memory utilization are reduced.

Answers
B.

Only the flows of top 100 talkers are exported

B.

Only the flows of top 100 talkers are exported

Answers
C.

The data export flow is more secure.

C.

The data export flow is more secure.

Answers
D.

The number of packets to be analyzed are reduced

D.

The number of packets to be analyzed are reduced

Answers
E.

The accuracy of the data to be analyzed is improved

E.

The accuracy of the data to be analyzed is improved

Answers
Suggested answer: A, D

Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?

A.

efficient scalability

A.

efficient scalability

Answers
B.

virtualization

B.

virtualization

Answers
C.

storage capacity

C.

storage capacity

Answers
D.

supported systems

D.

supported systems

Answers
Suggested answer: A

Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on Switch1 to achieve the following results on port fa0/1? When a device is connected, the port transitions immediately to a forwarding state.

The interface should not send or receive BPDUs.

If a BPDU is received, it continues operating normally.

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

Refer to the exhibit.

What is the Json syntax that is formed from the data?

A.

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

A.

{Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]}

Answers
B.

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

B.

{"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

Answers
C.

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

C.

{"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite Foods': "˜Cereal', "˜Mustard', "˜Onions'}

Answers
D.

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

D.

{"Name": "Bob Johnson", "Age": Seventyfive, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]}

Answers
Suggested answer: B

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

A.

Layer 3

A.

Layer 3

Answers
B.

inter-xTR

B.

inter-xTR

Answers
C.

auto anchor

C.

auto anchor

Answers
D.

fast roam

D.

fast roam

Answers
Suggested answer: D

Explanation:

A fabric edge node provides onboarding and mobility services for wired users and devices (including fabric-enabled WLCs and APs) connected to the fabric. It is a LISP tunnel router (xTR) that also provides the anycast gateway, endpoint authentication, and assignment to overlay host pools (static or DHCP), as well as group-based policy enforcement (for traffic to fabric endpoints).From Cisco's guide, under SDA roaming - When a client on a fabric enabled WLAN, roams from an access point to another access point on a different access-switch, it is called Inter-xTR, like a highway.Intra is within intra is between. Like interstate highways. That's how I remember.https://www.cisco.com/c/en/us/td/docs/wireless/

controller/9800/config- guide/b_wl_16_10_cg/mobility.html

Total 983 questions
Go to page: of 99