ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 24

Question list
Search
Search

Related questions











What is a characteristic of Cisco DNA Northbound APIs?

A.

They simplify the management of network infrastructure devices.

A.

They simplify the management of network infrastructure devices.

Answers
B.

They enable automation of network infrastructure based on intent.

B.

They enable automation of network infrastructure based on intent.

Answers
C.

They utilize RESTCONF.

C.

They utilize RESTCONF.

Answers
D.

They utilize multivendor support APIs.

D.

They utilize multivendor support APIs.

Answers
Suggested answer: C

An engineer configures a WLAN with fast transition enabled Some legacy clients fail to connect to this WLAN Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on then OLTIs?

A.

over the DS

A.

over the DS

Answers
B.

adaptive R

B.

adaptive R

Answers
C.

802.11V

C.

802.11V

Answers
D.

802.11k

D.

802.11k

Answers
Suggested answer: B

Refer to the exhibit.

All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)

A.

DSW2(config-if)#spanning-tree port-priority 16

A.

DSW2(config-if)#spanning-tree port-priority 16

Answers
B.

DSW2(config)#interface gi1/3

B.

DSW2(config)#interface gi1/3

Answers
C.

DSW1(config-if)#spanning-tree port-priority 0

C.

DSW1(config-if)#spanning-tree port-priority 0

Answers
D.

DSW1(config) #interface gi1/3

D.

DSW1(config) #interface gi1/3

Answers
E.

DSW2(config-if)#spanning-tree port-priority 128

E.

DSW2(config-if)#spanning-tree port-priority 128

Answers
Suggested answer: A, B

Which two items are found in YANG data models? (Choose two.)

A.

HTTP return codes

A.

HTTP return codes

Answers
B.

rpc statements

B.

rpc statements

Answers
C.

JSON schema

C.

JSON schema

Answers
D.

container statements

D.

container statements

Answers
E.

XML schema

E.

XML schema

Answers
Suggested answer: C, E

Which element enables communication between guest VMs within a virtualized environment?

A.

hypervisor

A.

hypervisor

Answers
B.

vSwitch

B.

vSwitch

Answers
C.

virtual router

C.

virtual router

Answers
D.

pNIC

D.

pNIC

Answers
Suggested answer: B

Refer to the exhibit.

A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?

A.

10.111.111.1

A.

10.111.111.1

Answers
B.

10.111.111.2

B.

10.111.111.2

Answers
C.

209.165.202.130

C.

209.165.202.130

Answers
D.

209.165.202.134

D.

209.165.202.134

Answers
Suggested answer: A

Which function does a fabric edge node perform in an SD-Access deployment?

A.

Connects the SD-Access fabric to another fabric or external Layer 3 networks

A.

Connects the SD-Access fabric to another fabric or external Layer 3 networks

Answers
B.

Connects endpoints to the fabric and forwards their traffic

B.

Connects endpoints to the fabric and forwards their traffic

Answers
C.

Provides reachability border nodes in the fabric underlay

C.

Provides reachability border nodes in the fabric underlay

Answers
D.

Encapsulates end-user data traffic into LISP.

D.

Encapsulates end-user data traffic into LISP.

Answers
Suggested answer: B

Explanation:

There are five basic device roles in the fabric overlay:

+ Control plane node: This node contains the settings, protocols, and mapping tables to provide the endpoint-to-location (EID-to-RLOC) mapping system for the fabric overlay.

+ Fabric border node: This fabric device (for example, core layer device) connects external Layer 3 networks to the SDA fabric.

+ Fabric edge node: This fabric device (for example, access or distribution layer device) connects wired endpoints to the SDA fabric.

+ Fabric WLAN controller (WLC): This fabric device connects APs and wireless endpoints to the SDA fabric.

+ Intermediate nodes: These are intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.

Which access point mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

A.

client mode

A.

client mode

Answers
B.

SE-connect mode

B.

SE-connect mode

Answers
C.

sensor mode

C.

sensor mode

Answers
D.

sniffer mode

D.

sniffer mode

Answers
Suggested answer: C

Explanation:

As these wireless networks grow especially in remote facilities where IT professionals may not always be onsite, it becomes even more important to be able to quickly identify and resolve potential connectivity issuesideally before the users complain or notice connectivity degradation. To address these issues we have created Cisco's Wireless Service Assurance and a new AP mode called "sensor"mode. Cisco's Wireless Service Assurance platform has three components, namely, Wireless PerformanceAnalytics, Real-time Client Troubleshooting, and Proactive Health Assessment. Using a supported AP ordedicated sensor the device can actually function much like a WLAN client would associating andidentifying client connectivity issues within the network in real time without requiring an IT or technician to beon site.

Reference:

https://content.cisco.com/chapter.sjs?uri=/searchable/chapter/content/dam/en/us/td/docs/wireless/controller/technotes/8-5/b_Cisco_Aironet_Sensor_Deployment_Guide.html.xml

What is the structure of a JSON web token?

A.

three parts separated by dots: header payload, and signature

A.

three parts separated by dots: header payload, and signature

Answers
B.

header and payload

B.

header and payload

Answers
C.

three parts separated by dots: version header and signature

C.

three parts separated by dots: version header and signature

Answers
D.

payload and signature

D.

payload and signature

Answers
Suggested answer: A

Explanation:

JSON Web Token (JWT) is an open standard (RFC 7519) that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed. JWTs can be signed using a secret (with the HMAC algorithm) or a public/private key pair using RSA or ECDSA.

JSON Web Tokens are composed of three parts, separated by a dot (.): Header, Payload, Signature. Therefore, a JWT typically looks like the following: xxxxx.yyyyy.zzzzz The header typically consists of two parts: the type of the token, which is JWT, and the signing algorithm being used, such as HMAC SHA256 or RSA.

The second part of the token is the payload, which contains the claims. Claims are statements about an entity (typically, the user) and additional data.

To create the signature part you have to take the encoded header, the encoded payload, a secret, the algorithm specified in the header, and sign that.

Reference: https://jwt.io/introduction/

Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?

A.

bridge domain

A.

bridge domain

Answers
B.

VLAN

B.

VLAN

Answers
C.

VRF

C.

VRF

Answers
D.

VNI

D.

VNI

Answers
Suggested answer: D

Explanation:

VXLAN has a 24-bit VXLAN network identifier (VNI), which allows for up to 16 million (= 224) VXLAN segments to coexist within the same infrastructure. This surely solve the small number of traditional VLANs.

Total 983 questions
Go to page: of 99