Cisco 350-401 Practice Test - Questions Answers, Page 22
List of questions
Question 211

The login method is configured on the VTY lines of a router with these parameters The first method for authentication it TACACS If TACACS is unavailable login is allowed without any provided credentials Which configuration accomplishes this task?
Option A
Option B
Option C
Option D
Question 212

Which network devices secure API platform?
next-generation intrusion detection systems
Layer 3 transit network devices
content switches
web application firewalls
Reference: https://www.cisco.com/c/en/us/products/collateral/security/advanced-waf-bot-aag.pdf
> Cisco® Secure Web Application Firewall (WAF) and bot protection defends your
> online presence and ensures that website, mobile applications, and APIs
> are secure, protected, and "always on."
Question 213

Refer to the exhibit.
What is required to configure a second export destination for IP address 192.168.10.1?
Specify a VRF.
Specify a different UDP port.
Specify a different flow ID
Configure a version 5 flow-export to the same destination.
Specify a different TCP port.
To configure multiple NetFlow export destinations to a router, use the following commands in global configuration mode:
Step 1: Router(config)# ip flow-export destination ip-address udp-port Step 2: Router(config)# ip flow-export destination ip-address udp-port The following example enables the exporting of information in NetFlow cache entries: ip flow-export destination 10.42.42.1 9991 ip flow-export destination 10.0.101.254 1999
Reference: https://www.cisco.com/c/en/us/td/docs/ios/12_0s/feature/guide/12s_mdnf.html
Question 214

Which threat defence mechanism, when deployed at the network perimeter, protects against zeroday attacks?
intrusion prevention
stateful inspection
sandbox
SSL decryption
Reference: https://www.cisco.com/c/en/us/products/collateral/security/amp-appliances/datasheetc78-733182.html"File analysis and sandboxing: Secure Malware Analytics' highly secure environment helps youexecute, analyze, and test malware behavior to discover previously unknown ZERO-DAY threats. Theintegration of Secure Malware Analytics' sandboxing technology into Malware Defense results inmore dynamic analysis checked against a larger set of behavioral indicators. "
Question 215

Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration must be applied?
AP(config-if-ssid)# authentication open wep wep_methods
AP(config-if-ssid)# authentication dynamic wep wep_methods
AP(config-if-ssid)# authentication dynamic open wep_dynamic
AP(config-if-ssid)# authentication open eap eap_methods
Question 216

Which OSPF networks types are compatible and allow communication through the two peering devices?
broadcast to nonbroadcast
point-to-multipoint to nonbroadcast
broadcast to point-to-point
point-to-multipoint to broadcast
The following different OSPF types are compatible with each other:
+ Broadcast and Non-Broadcast (adjust hello/dead timers)
+ Point-to-Point and Point-to-Multipoint (adjust hello/dead timers)
Broadcast and Non-Broadcast networks elect DR/BDR so they are compatible. Point-topoint/ multipoint do not elect DR/BDR so they are compatible.
Question 217

Refer to the exhibit.
An engineer must configure a SPAN session. What is the effect of the configuration?
Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.
Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.
Traffic received on VLANs 10, 11, and 12 is copied and sent to Interface g0/1.
Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.
Question 218

An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface. Which option also is required on the tunnel interface before it is operational?
(config-if)#tunnel destination <ip address>
(config-if)#keepalive <seconds retries>
(config-if)#ip mtu <value>
(config-if)#ip tcp adjust-mss <value>
A GRE interface definition includes: + An IPv4 address on the tunnel + A tunnel source + A tunnel destination Below is an example of how to configure a basic GRE tunnel: interface Tunnel 0 ip address 10.10.10.1 255.255.255.0 tunnel source fa0/0 tunnel destination 172.16.0.2 In this case the “IPv4 address on the tunnel” is 10.10.10.1/24 and “sourced the tunnel from an Ethernet interface” is the command “tunnel source fa0/0”. Therefore it only needs a tunnel destination, which is 172.16.0.2.Note: A multiple GRE (mGRE) interface does not require a tunnel destination address.
Question 219

Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
VLAN
VTEP
VXLAN
VRF
Question 220

Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
192.168.101.18
192.168.101.6
192.168.101.10
192.168.101.14
The '>' shown in the output above indicates that the path with a next hop of 192.168.101.2 is the current best path.
Path Selection Attributes: Weight > Local Preference > Originate > AS Path > Origin > MED > External > IGP Cost > eBGP Peering > Router ID BGP prefers the path with highest weight but the weights here are all 0 (which indicate all routes that are not originated by the local router) so we need to check the Local Preference. Answer '192.168.101.18' path without LOCAL_PREF (LocPrf column) means it has the default value of 100.
Therefore we can find the two next best paths with the next hop of 192.168.101.18 and 192.168.101.10.
We have to move to the next path selection attribute: Originate. BGP prefers the path that the local router originated (which is indicated with the "next hop 0.0.0.0"). But none of the two best paths is self-originated.
The AS Path of the next hop 192.168.101.18 is shorter than the AS Path of the next hop 192.168.101.10 then the next hop 192.168.101.18 will be chosen as the next best path.
Question