ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 30

Question list
Search
Search

List of questions

Search

Related questions











A network engineer configures a WLAN controller with increased security for web access. There is IP connectivity with the WLAN controller, but the engineer cannot start a management session from a web browser. Which action resolves the issued

A.

Disable JavaScript on the web browser

A.

Disable JavaScript on the web browser

Answers
B.

Disable Adobe Flash Player

B.

Disable Adobe Flash Player

Answers
C.

Use a browser that supports 128-bit or larger ciphers.

C.

Use a browser that supports 128-bit or larger ciphers.

Answers
D.

Use a private or incognito session.

D.

Use a private or incognito session.

Answers
Suggested answer: C

In a Cisco SD-WAN solution, how Is the health of a data plane tunnel monitored?

A.

with IP SLA

A.

with IP SLA

Answers
B.

ARP probing

B.

ARP probing

Answers
C.

using BFD

C.

using BFD

Answers
D.

with OMP

D.

with OMP

Answers
Suggested answer: C

Refer to the exhibit.

An engineer must configure static NAT on R1 lo allow users HTTP access to the web server on TCPport 80. The web server must be reachable through ISP 1 and ISP 2. Which command set should beapplied to R1 to fulfill these requirements?

A.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 extendable ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 extendable

A.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 extendable ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 extendable

Answers
B.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80

B.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80

Answers
C.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 8080 209.165.201.1 8080

C.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 ip nat inside source static tcp 10.1.1.100 8080 209.165.201.1 8080

Answers
D.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 no-alias ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 no-alias

D.

ip nat inside source static tcp 10.1.1.100 80 209.165.200.225 80 no-alias ip nat inside source static tcp 10.1.1.100 80 209.165.201.1 80 no-alias

Answers
Suggested answer: B

By default, which virtual MAC address does HSRP group 16 use?

A.

c0:41:43:64:13:10

A.

c0:41:43:64:13:10

Answers
B.

00:00:0c 07:ac:10

B.

00:00:0c 07:ac:10

Answers
C.

00:05:5c:07:0c:16

C.

00:05:5c:07:0c:16

Answers
D.

05:00:0c:07:ac:16

D.

05:00:0c:07:ac:16

Answers
Suggested answer: B

Explanation:

The last two-digit hex value in the MAC address presents the HSRP group number. In this case 16 in decimal is 10 in hexadecimal

A customer requests a design that includes GLBP as the FHRP The network architect discovers that the members of the GLBP group have different throughput capabilities Which GLBP load balancing method supports this environment?

A.

host dependent

A.

host dependent

Answers
B.

least connection

B.

least connection

Answers
C.

round robin

C.

round robin

Answers
D.

weighted

D.

weighted

Answers
Suggested answer: D

Explanation:

Weighted: Defines weights to each device in the GLBP group to define the ratio of load balancing between the devices. This allows for a larger weight to be assigned to bigger routers that can handle more traffic. protocol is used by an extended

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

A.

advertisement of network prefixes and their attributes

Answers
B.

configuration of control and data policies

B.

configuration of control and data policies

Answers
C.

gathering of underlay infrastructure data

C.

gathering of underlay infrastructure data

Answers
D.

delivery of crypto keys

D.

delivery of crypto keys

Answers
E.

segmentation and differentiation of traffic

E.

segmentation and differentiation of traffic

Answers
Suggested answer: A, B

Explanation:

OMP is the control protocol that is used to exchange routing, policy, and management information between Cisco vSmart Controllers and Cisco IOS XE SD-WAN devices in the overlay network. These devices automatically initiate OMP peering sessions between themselves, and the two IP end points of the OMP session are the system IP addresses of the two devices.

A network engineer is enabling HTTPS access to the core switch, which requires a certificate to beinstalled on the switch signed by the corporate certificate authority Which configuration commandsare required to issue a certificate signing request from the core switch?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

Explanation:

Certificate authorities (CAs) are responsible for managing certificate requests and issuing certificates to participating IPSec network devices. These services provide centralized security key and certificate management for the participating devices. Specific CA servers are referred to as "trustpoints." The command "crypto pki trustpoint name" declares the trustpoint and a given name and enters catrustpoint configuration mode.

The command "enrollment terminal" specifies manual cut-and-paste certificate enrollment method.

The certificate request will be displayed on the console terminal so that you may manually copied (or cut).

The command "crypto pki enroll name" generates certificate request and displays the request for copying and pasting into the certificate server.

The full configuration is shown in the reference below.

Reference: https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/sec_secure_connectivity/configuration/guide/convert/sec_pki_xe_3s_book/sec_cert_enroll_pki_xe.html

What is the process for moving a virtual machine from one host machine to another with no downtime?

A.

high availability

A.

high availability

Answers
B.

disaster recovery

B.

disaster recovery

Answers
C.

live migration

C.

live migration

Answers
D.

multisite replication

D.

multisite replication

Answers
Suggested answer: C

When are multicast RPs required?

A.

RPs are required only when using protocol independent multicast dense mode.

A.

RPs are required only when using protocol independent multicast dense mode.

Answers
B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

B.

By default, the RP is needed penodically to maintain sessions with sources and receivers.

Answers
C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

C.

RPs are required for protocol Independent multicast sparse mode and dense mode.

Answers
D.

By default, the RP Is needed only start new sessions with sources and receivers.

D.

By default, the RP Is needed only start new sessions with sources and receivers.

Answers
Suggested answer: D

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication Which profile must the engineer edit to achieve this requirement?

A.

RF

A.

RF

Answers
B.

Policy

B.

Policy

Answers
C.

WLAN

C.

WLAN

Answers
D.

Flex

D.

Flex

Answers
Suggested answer: B

Explanation:

https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/116880-configwpa2-psk-00.html

Total 983 questions
Go to page: of 99