ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 28

Question list
Search
Search

Related questions











Which two GRE features are configured to prevent fragmentation? (Choose two.)

A.

TCP MSS

A.

TCP MSS

Answers
B.

PMTUD

B.

PMTUD

Answers
C.

DF bit Clear

C.

DF bit Clear

Answers
D.

MTU ignore

D.

MTU ignore

Answers
E.

IP MTU

E.

IP MTU

Answers
F.

TCP window size

F.

TCP window size

Answers
Suggested answer: A, E

Which outcome is achieved with this Python code?

A.

connects to a Cisco device using SSH and exports the routing table information

A.

connects to a Cisco device using SSH and exports the routing table information

Answers
B.

displays the output of the show command in a formatted way

B.

displays the output of the show command in a formatted way

Answers
C.

connects to a Cisco device using SSH and exports the BGP table for the prefix

C.

connects to a Cisco device using SSH and exports the BGP table for the prefix

Answers
D.

connects to a Cisco device using Telnet and exports the routing table information

D.

connects to a Cisco device using Telnet and exports the routing table information

Answers
Suggested answer: C

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A.

ISE server

A.

ISE server

Answers
B.

local WLC

B.

local WLC

Answers
C.

RADIUS server

C.

RADIUS server

Answers
D.

anchor WLC

D.

anchor WLC

Answers
Suggested answer: B

Explanation:

"The next step is to configure the WLC for the Internal web authentication. Internal web authentication is the defaultweb authentication type on WLCs." In step 4 of the link above, we will configure Security as described in this question.

Therefore we can deduce thisconfiguration is for Internal web authentication.

This paragraph was taken from the link https://www.cisco.com/c/en/us/support/docs/wirelessmobility/wlan-security/69340-web-auth-config.html#c5 :


Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A.

threat defense

A.

threat defense

Answers
B.

security services

B.

security services

Answers
C.

security intelligence

C.

security intelligence

Answers
D.

segmentation

D.

segmentation

Answers
Suggested answer: C

Refer to the exhibit.

Which privilege level is assigned to VTY users?

A.

1

A.

1

Answers
B.

7

B.

7

Answers
C.

13

C.

13

Answers
D.

15

D.

15

Answers
Suggested answer: A

Explanation:

Lines (CON, AUX, VTY) default to level 1 privileges.

What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?

A.

real-time threat management to stop DDoS attacks to the core and access networks

A.

real-time threat management to stop DDoS attacks to the core and access networks

Answers
B.

real-time awareness of users, devices and traffic on the network

B.

real-time awareness of users, devices and traffic on the network

Answers
C.

malware control

C.

malware control

Answers
D.

dynamic threat control for web traffic

D.

dynamic threat control for web traffic

Answers
Suggested answer: B

Explanation:

"Cisco Stealthwatch collects and analyzes massive amounts of data to give even the largest, most dynamic networks comprehensive internal visibility and protection. It helps security operations teams gain real-time situational awareness of all users, devices, and traffic on the extended network so they can quickly and effectively respond to threats"Page 1https://media.zones.com/images/pdf/cisco-stealthwatch-solution-overview.pdf

Refer to the exhibit.

An engineer must establish eBGP peering between router R3 and router R4. Both routers should use their loopback interfaces as the BGP router ID. Which configuration set accomplishes this task?

A.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)# neighbor 10.4.4.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#network 10.3.3.3 update-source Loopback0

A.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)# neighbor 10.4.4.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#network 10.3.3.3 update-source Loopback0

Answers
B.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#neighbor 10.24.24.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#neighbor 10.24.24.3 update-source Loopback0

B.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#neighbor 10.24.24.4 update-source Loopback0

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#neighbor 10.24.24.3 update-source Loopback0

Answers
C.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

C.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.4.4.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.3.3.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

Answers
D.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

D.

R3(config)#router bgp 200

R3(config-router)#neighbor 10.24.24.4 remote-as 100

R3(config-router)#bgp router-id 10.3.3.3

R4(config)#router bgp 100

R4(config-router)#neighbor 10.24.24.3 remote-as 200

R4(config-router)#bgp router-id 10.4.4.4

Answers
Suggested answer: D

Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

A.

security group tag ACL assigned to each port on a switch

A.

security group tag ACL assigned to each port on a switch

Answers
B.

security group tag number assigned to each port on a network

B.

security group tag number assigned to each port on a network

Answers
C.

security group tag number assigned to each user on a switch

C.

security group tag number assigned to each user on a switch

Answers
D.

security group tag ACL assigned to each router on a network

D.

security group tag ACL assigned to each router on a network

Answers
Suggested answer: B

Explanation:

Cisco TrustSec uses tags to represent logical group privilege. This tag, called a Security Group Tag

(SGT), is used in access policies. The SGT is understood and is used to enforce traffic by Cisco switches, routers and firewalls . Cisco TrustSec is defined in three phases: classification, propagation and enforcement.

When users and devices connect to a network, the network assigns a specific security group. This process is called classification. Classification can be based on the results of the authentication or by associating the SGT with an IP, VLAN, or port-profile (-> Answer 'security group tag ACL assigned to each port on a switch' and answer 'security group tag number assigned to each user on a switch' are not correct as they say "assigned … on a switch" only. Answer 'security group tag ACL assigned to each router on a network' is not correct either as it says "assigned to each router").

In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?

A.

provide QoS prioritization services such as marking, queueing, and classification for critical network traffic

A.

provide QoS prioritization services such as marking, queueing, and classification for critical network traffic

Answers
B.

provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

B.

provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergence

Answers
C.

provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security

C.

provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security

Answers
D.

provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

D.

provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP

Answers
Suggested answer: B

Refer to the Exhibit.

An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected.

Which action will resolve the configuration error?

A.

configure matching hold and delay timers

A.

configure matching hold and delay timers

Answers
B.

configure matching key-strings

B.

configure matching key-strings

Answers
C.

configure matching priority values

C.

configure matching priority values

Answers
D.

configure unique virtual IP addresses

D.

configure unique virtual IP addresses

Answers
Suggested answer: B

Explanation:

From the output exhibit, we notice that the key-string of R1 is ?Cisco123!? (letter ?C? is in capital) while that of R2 is ?cisco123!?. This causes a mismatch in the authentication so we have to fix their key-strings. key-string [encryption-type] text-string: Configures the text string for the key. The text-string argument is alphanumeric, case-sensitive, and supports special characters.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/security/configuration/guide/b_Cisco_Nexus_9000_Series_NXOS_Security_Configuration_Guide/b_Cisco_Nexus_9000_Series_NXOS_Security_Configuration_Guide_chapter_01111.pdf

Total 983 questions
Go to page: of 99