Cisco 350-401 Practice Test - Questions Answers, Page 34
Related questions
What is the function of a control-plane node In a Cisco SD-Access solution?
to run a mapping system that manages endpoint to network device relationships
to implement policies and communicate with networks outside the fabric
to connect external Layer 3 networks to the SD-Access fabric
to connect APs and wireless endpoints to the SD-Access fabric
Refer to the exhibit.
What are two reasons for IP SLA tracking failure? (Choose two )
The destination must be 172 30 30 2 for icmp-echo
A route back to the R1 LAN network is missing in R2.
The source-interface is configured incorrectly.
The default route has the wrong next hop IP address
The threshold value is wrong
A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?
Fast Transition
Central Web Authentication
Cisco Centralized Key Management
Identity PSK
Refer to the exhibit.
An engineer must prevent the R6 loopback from getting into Area 2 and Area 3 from Area 0 Which action must the engineer take?
Apply a fitter list inbound on R2 and R9
Apply a filter list outbound on R3 and R7
Apply a filter list outbound on R7 only.
Apply a filter list inbound on R3 and R7
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
management and data
control and management
control, and forwarding
control and data
Refer to the exhibit.
Which two facts does the device output confirm? (Choose two.)
The device sends unicast messages to its peers
The device's HSRP group uses the virtual IP address 10.0.3.242
The standby device is configured with the default HSRP priority.
The device is using the default HSRP hello timer
The device is configured with the default HSRP priority
How is a data modeling language used?
To enable data lo be easily structured, grouped, validated, and replicated
To represent finite and well-defined network elements that cannot be changed
To model the flows of unstructured data within the infrastructure
To provide human readability to scripting languages
Refer to the exhibit.
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32.
Which configuration should be applied for the subnet to be advertised with the original /24 netmask?
What is one primary REST security design principle?
fail-safe defaults
password hash
adding a timestamp in requests
OAuth
Refer to the exhibit.
An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)
Question