ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 25

Question list
Search
Search

Related questions











An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

A.

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

A.

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

Answers
B.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

B.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

Answers
C.

Use Cisco Firepower and block traffic to TOR networks.

C.

Use Cisco Firepower and block traffic to TOR networks.

Answers
D.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

D.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

Answers
Suggested answer: B

Refer to the exhibit.

Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Refer to the exhibit.

What step resolves the authentication issue?

A.

use basic authentication

A.

use basic authentication

Answers
B.

change the port to 12446

B.

change the port to 12446

Answers
C.

target 192 168 100 82 in the URI

C.

target 192 168 100 82 in the URI

Answers
D.

restart the vsmart host

D.

restart the vsmart host

Answers
Suggested answer: B

Explanation:


What is required for a virtual machine to run?

A.

a Type 1 hypervisor and a host operating system

A.

a Type 1 hypervisor and a host operating system

Answers
B.

a hypervisor and physical server hardware

B.

a hypervisor and physical server hardware

Answers
C.

only a Type 1 hypervisor

C.

only a Type 1 hypervisor

Answers
D.

only a Type 2 hypervisor

D.

only a Type 2 hypervisor

Answers
Suggested answer: B

What is required for intercontroller Layer 3 roaming?

A.

Mobility groups are established between wireless controllers.

A.

Mobility groups are established between wireless controllers.

Answers
B.

The management VLAN is present as a dynamic VLAN on the second WLC.

B.

The management VLAN is present as a dynamic VLAN on the second WLC.

Answers
C.

WLCs use separate DHCP servers.

C.

WLCs use separate DHCP servers.

Answers
D.

WLCs have the same IP addresses configured on their interfaces.

D.

WLCs have the same IP addresses configured on their interfaces.

Answers
Suggested answer: D

An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?

interface GigabitEthernet0/1 ip address 10.10.10.2 255.255.255.0 vrrp 115 ip 10.10.10.1 vrrp 115 authentication 407441579

A.

Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt

A.

Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt

Answers
B.

Router(config-if)# vrrp 115 priority 100

B.

Router(config-if)# vrrp 115 priority 100

Answers
C.

Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt

C.

Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt

Answers
D.

Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt

D.

Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt

Answers
Suggested answer: B

An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: C, D

What is a benefit of Type 1 hypervisors?

A.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

A.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

Answers
B.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

B.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

Answers
C.

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

C.

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

Answers
D.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

D.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Answers
Suggested answer: B

What is the wireless received signal strength indicator?

A.

The value given to the strength of the wireless signal received compared to the noise level

A.

The value given to the strength of the wireless signal received compared to the noise level

Answers
B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

B.

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

Answers
C.

The value of how much wireless signal is lost over a defined amount of distance

C.

The value of how much wireless signal is lost over a defined amount of distance

Answers
D.

The value of how strong a tireless signal is receded, measured in dBm

D.

The value of how strong a tireless signal is receded, measured in dBm

Answers
Suggested answer: D

Explanation:

RSSI, or "Received Signal Strength Indicator," is a measurement of how well your device can hear a signal from an access point or router. It's a value that is useful for determining if you have enough signal to get a good wireless connection.

This value is measured in decibels (dBm) from 0 (zero) to -120 (minus 120). The closer to 0 (zero) the stronger the signal is which means it's better, typically voice networks require a -65db or better signal level while a data network needs - 80db or better.

Refer to the exhibit.

After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.

09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/0, putting Gi0/0 in err-disable state

09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/1, putting Gi0/1 in err-disable state

Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?

A.

Configure the same protocol on the EtherChannel on switch SW1 and SW2.

A.

Configure the same protocol on the EtherChannel on switch SW1 and SW2.

Answers
B.

Connect the configuration error on interface Gi0/1 on switch SW1.

B.

Connect the configuration error on interface Gi0/1 on switch SW1.

Answers
C.

Define the correct port members on the EtherChannel on switch SW1.

C.

Define the correct port members on the EtherChannel on switch SW1.

Answers
D.

Correct the configuration error on interface Gi0/0 switch SW1.

D.

Correct the configuration error on interface Gi0/0 switch SW1.

Answers
Suggested answer: A

Explanation:

In this case, we are using your EtherChannel without a negotiation protocol. As a result, if the opposite switch is not also configured for EtherChannel operation on the respective ports, there is a danger of a switching loop. The EtherChannel

Misconfiguration Guard tries to prevent that loop from occuring by disabling all the ports bundled in the EtherChannel.

Total 983 questions
Go to page: of 99