ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 20

List of questions

Question 191

Report Export Collapse

Refer the exhibit.

Cisco 350-401 image Question 191 115490 10102024232942000000

Which router is the designated router on the segment 192.168.0.0/24?

This segment has no designated router because it is a nonbroadcast network type.

This segment has no designated router because it is a nonbroadcast network type.

This segment has no designated router because it is a p2p network type.

This segment has no designated router because it is a p2p network type.

Router Chicago because it has a lower router ID

Router Chicago because it has a lower router ID

Router NewYork because it has a higher router ID

Router NewYork because it has a higher router ID

Suggested answer: B
asked 10/10/2024
Edward Eric
40 questions

Question 192

Report Export Collapse

The login method is configured on the VTY lines of a router with these parameters.

The first method for authentication is TACACS

If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task?

R1#sh run | include aaa

aaa new-model

aaa authentication login VTY group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

R1#sh run | include username

R1#

R1#sh run | include aaa

aaa new-model

aaa authentication login VTY group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

R1#sh run | include username

R1#

R1#sh run | include aaa

aaa new-model

aaa authentication login telnet group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

R1#sh run | include username

R1#

R1#sh run | include aaa

aaa new-model

aaa authentication login telnet group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

R1#sh run | include username

R1#

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+ none

aaa session-id common

R1#sh run | section vty

line vty 0 4

password 7 0202039485748

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+

aaa session-id common

R1#sh run | section vty

line vty 0 4

transport input none

R1#

R1#sh run | include aaa

aaa new-model

aaa authentication login default group tacacs+

aaa session-id common

R1#sh run | section vty

line vty 0 4

transport input none

R1#

Suggested answer: C
Explanation:

According to the requirements (first use TACACS+, then allow login with no authentication), we have to use "aaa authentication login … group tacacs+ none" for AAA command.

The next thing to check is the if the "aaa authentication login default" or "aaa authentication login list-name" is used. The 'default' keyword means we want to apply for all login connections (such as tty, vty, console and aux). If we use this keyword, we don't need to configure anything else under tty, vty and aux lines. If we don't use this keyword then we have to specify which line(s) we want to apply the authentication feature.

From above information, we can find out answer 'R1#sh run | include aaa aaa new-model aaa authentication login default group tacacs+ none aaa session-id common R1#sh run | section vty line vty 0 4 password 7 0202039485748 If you want to learn more about AAA configuration, please read our AAA TACACS+ and RADIUS Tutorial – Part 2.

For your information, answer 'R1#sh run | include aaa aaa new-model aaa authentication login telnet group tacacs+ none aaa session-id common R1#sh run | section vty line vty 0 4 R1#sh run | include username R1#' would be correct if we add the following command under vty line ("line vty 0 4"): "login authentication telnet" ("telnet" is the name of the AAA list above)

asked 10/10/2024
ML MASANE
50 questions

Question 193

Report Export Collapse

Which technology is used as the basis for the cisco sd-access data plane?

IPsec

IPsec

LISP

LISP

VXLAN

VXLAN

802.1Q

802.1Q

Suggested answer: C
Explanation:

A virtual network identifier (VNI) is a value that identifies a specific virtual network in the data plane.

asked 10/10/2024
Davide Maranzana
37 questions

Question 194

Report Export Collapse

What is YANG used for?

scraping data via CLI

scraping data via CLI

processing SNMP read-only polls

processing SNMP read-only polls

describing data models

describing data models

providing a transport for network configuration data between client and server

providing a transport for network configuration data between client and server

Suggested answer: C
asked 10/10/2024
Dirk Lamberts
47 questions

Question 195

Report Export Collapse

Which method does Cisco DNA Center use to allow management of non-Cisco devices through southbound protocols?

It creates device packs through the use of an SDK

It creates device packs through the use of an SDK

It uses an API call to interrogate the devices and register the returned data.

It uses an API call to interrogate the devices and register the returned data.

It obtains MIBs from each vendor that details the APIs available.

It obtains MIBs from each vendor that details the APIs available.

It imports available APIs for the non-Cisco device in a CSV format.

It imports available APIs for the non-Cisco device in a CSV format.

Suggested answer: A
Explanation:

Cisco DNA Center allows customers to manage their non-Cisco devices through the use of a Software Development Kit (SDK) that can be used to create Device Packages for third-party devices.

Reference: https://developer.cisco.com/docs/dna-center/#!cisco-dna-center-platformoverview/multivendor-support-southbound

asked 10/10/2024
Nour Algharbi
45 questions

Question 196

Report Export Collapse

A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?

1

1

2

2

4

4

8

8

Suggested answer: B
asked 10/10/2024
Shauqi Naufaldy
34 questions

Question 197

Report Export Collapse

What are two considerations when using SSO as a network redundancy feature? (Choose two)

both supervisors must be configured separately

both supervisors must be configured separately

the multicast state is preserved during switchover

the multicast state is preserved during switchover

must be combined with NSF to support uninterrupted Layer 2 operations

must be combined with NSF to support uninterrupted Layer 2 operations

must be combined with NSF to support uninterrupted Layer 3 operations

must be combined with NSF to support uninterrupted Layer 3 operations

requires synchronization between supervisors in order to guarantee continuous connectivity

requires synchronization between supervisors in order to guarantee continuous connectivity

Suggested answer: D, E
Explanation:

Cisco IOS Nonstop Forwarding(NSF) always runs with stateful switchover (SSO) and provides redundancy for Layer 3 traffic.

Reference:

https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consolidated_3850_3se_cg_chapter_01101110.pdf

asked 10/10/2024
Kristina Stojanovska
47 questions

Question 198

Report Export Collapse

Cisco 350-401 image Question 198 115497 10102024232942000000

Refer to the exhibit. Which command is required to verify NETCONF capability reply messages?

show netconf | section rpc-reply

show netconf | section rpc-reply

show netconf rpc-reply

show netconf rpc-reply

show netconf xml rpc-reply

show netconf xml rpc-reply

show netconf schema | section rpc-reply

show netconf schema | section rpc-reply

Suggested answer: D
asked 10/10/2024
Francesco Balducci
40 questions

Question 199

Report Export Collapse

A network engineer must configure a router to send logging messages to a syslog server based on these requirements: uses syslog IP address: 10.10.10.1 uses a reliable protocol must not use any well-known TCP/UDP ports Which configuration must be used?

logging host 10.10.10.1 transport tcp port 1024

logging host 10.10.10.1 transport tcp port 1024

logging origin-id 10.10.10.1

logging origin-id 10.10.10.1

logging host 10.10.10.1 transport udp port 1023

logging host 10.10.10.1 transport udp port 1023

logging host 10.10.10.1 transport udp port 1024

logging host 10.10.10.1 transport udp port 1024

Suggested answer: A
asked 10/10/2024
Amine Alami
38 questions

Question 200

Report Export Collapse

Cisco 350-401 image Question 200 115499 10102024232942000000

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

Cisco 350-401 image Question 200 115499 10102024232942000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: C
asked 10/10/2024
Tanvir Anjum
45 questions
Total 983 questions
Go to page: of 99

Related questions