Cisco 350-401 Practice Test - Questions Answers, Page 28
List of questions
Related questions
Which two GRE features are configured to prevent fragmentation? (Choose two.)
TCP MSS
PMTUD
DF bit Clear
MTU ignore
IP MTU
TCP window size
Which outcome is achieved with this Python code?
connects to a Cisco device using SSH and exports the routing table information
displays the output of the show command in a formatted way
connects to a Cisco device using SSH and exports the BGP table for the prefix
connects to a Cisco device using Telnet and exports the routing table information
An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?
ISE server
local WLC
RADIUS server
anchor WLC
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
threat defense
security services
security intelligence
segmentation
Refer to the exhibit.
Which privilege level is assigned to VTY users?
1
7
13
15
What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?
real-time threat management to stop DDoS attacks to the core and access networks
real-time awareness of users, devices and traffic on the network
malware control
dynamic threat control for web traffic
Refer to the exhibit.
An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?
R3(config)#router bgp 200
R3(config-router)#neighbor 10.4.4.4 remote-as 100
R3(config-router)# neighbor 10.4.4.4 update-source Loopback0
R4(config)#router bgp 100
R4(config-router)#neighbor 10.3.3.3 remote-as 200
R4(config-router)#network 10.3.3.3 update-source Loopback0
R3(config)#router bgp 200
R3(config-router)#neighbor 10.24.24.4 remote-as 100
R3(config-router)#neighbor 10.24.24.4 update-source Loopback0
R4(config)#router bgp 100
R4(config-router)#neighbor 10.24.24.3 remote-as 200
R4(config-router)#neighbor 10.24.24.3 update-source Loopback0
R3(config)#router bgp 200
R3(config-router)#neighbor 10.4.4.4 remote-as 100
R3(config-router)#bgp router-id 10.3.3.3
R4(config)#router bgp 100
R4(config-router)#neighbor 10.3.3.3 remote-as 200
R4(config-router)#bgp router-id 10.4.4.4
R3(config)#router bgp 200
R3(config-router)#neighbor 10.24.24.4 remote-as 100
R3(config-router)#bgp router-id 10.3.3.3
R4(config)#router bgp 100
R4(config-router)#neighbor 10.24.24.3 remote-as 200
R4(config-router)#bgp router-id 10.4.4.4
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?
security group tag ACL assigned to each port on a switch
security group tag number assigned to each port on a network
security group tag number assigned to each user on a switch
security group tag ACL assigned to each router on a network
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
provide QoS prioritization services such as marking, queueing, and classification for critical network traffic
provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence
provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security
provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP
Refer to the Exhibit.
An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected.
Which action will resolve the configuration error?
configure matching hold and delay timers
configure matching key-strings
configure matching priority values
configure unique virtual IP addresses
Question