ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 34

Question list
Search
Search

Related questions











What is the function of a control-plane node In a Cisco SD-Access solution?

A.

to run a mapping system that manages endpoint to network device relationships

A.

to run a mapping system that manages endpoint to network device relationships

Answers
B.

to implement policies and communicate with networks outside the fabric

B.

to implement policies and communicate with networks outside the fabric

Answers
C.

to connect external Layer 3 networks to the SD-Access fabric

C.

to connect external Layer 3 networks to the SD-Access fabric

Answers
D.

to connect APs and wireless endpoints to the SD-Access fabric

D.

to connect APs and wireless endpoints to the SD-Access fabric

Answers
Suggested answer: A

Refer to the exhibit.

What are two reasons for IP SLA tracking failure? (Choose two )

A.

The destination must be 172 30 30 2 for icmp-echo

A.

The destination must be 172 30 30 2 for icmp-echo

Answers
B.

A route back to the R1 LAN network is missing in R2.

B.

A route back to the R1 LAN network is missing in R2.

Answers
C.

The source-interface is configured incorrectly.

C.

The source-interface is configured incorrectly.

Answers
D.

The default route has the wrong next hop IP address

D.

The default route has the wrong next hop IP address

Answers
E.

The threshold value is wrong

E.

The threshold value is wrong

Answers
Suggested answer: B, E

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

A.

Fast Transition

A.

Fast Transition

Answers
B.

Central Web Authentication

B.

Central Web Authentication

Answers
C.

Cisco Centralized Key Management

C.

Cisco Centralized Key Management

Answers
D.

Identity PSK

D.

Identity PSK

Answers
Suggested answer: D

Refer to the exhibit.

An engineer must prevent the R6 loopback from getting into Area 2 and Area 3 from Area 0 Which action must the engineer take?

A.

Apply a fitter list inbound on R2 and R9

A.

Apply a fitter list inbound on R2 and R9

Answers
B.

Apply a filter list outbound on R3 and R7

B.

Apply a filter list outbound on R3 and R7

Answers
C.

Apply a filter list outbound on R7 only.

C.

Apply a filter list outbound on R7 only.

Answers
D.

Apply a filter list inbound on R3 and R7

D.

Apply a filter list inbound on R3 and R7

Answers
Suggested answer: B

Explanation:

This question asks to prevent route advertised into Area 2 and Area 3 only. It does not ask to prevent route advertised into Area 0 so applying a filter list outbound on R3 and R7 would best fit the requirement.

In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?

A.

management and data

A.

management and data

Answers
B.

control and management

B.

control and management

Answers
C.

control, and forwarding

C.

control, and forwarding

Answers
D.

control and data

D.

control and data

Answers
Suggested answer: B

Refer to the exhibit.

Which two facts does the device output confirm? (Choose two.)

A.

The device sends unicast messages to its peers

A.

The device sends unicast messages to its peers

Answers
B.

The device's HSRP group uses the virtual IP address 10.0.3.242

B.

The device's HSRP group uses the virtual IP address 10.0.3.242

Answers
C.

The standby device is configured with the default HSRP priority.

C.

The standby device is configured with the default HSRP priority.

Answers
D.

The device is using the default HSRP hello timer

D.

The device is using the default HSRP hello timer

Answers
E.

The device is configured with the default HSRP priority

E.

The device is configured with the default HSRP priority

Answers
Suggested answer: C, D

How is a data modeling language used?

A.

To enable data lo be easily structured, grouped, validated, and replicated

A.

To enable data lo be easily structured, grouped, validated, and replicated

Answers
B.

To represent finite and well-defined network elements that cannot be changed

B.

To represent finite and well-defined network elements that cannot be changed

Answers
C.

To model the flows of unstructured data within the infrastructure

C.

To model the flows of unstructured data within the infrastructure

Answers
D.

To provide human readability to scripting languages

D.

To provide human readability to scripting languages

Answers
Suggested answer: A

Refer to the exhibit.

R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32.

Which configuration should be applied for the subnet to be advertised with the original /24 netmask?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

What is one primary REST security design principle?

A.

fail-safe defaults

A.

fail-safe defaults

Answers
B.

password hash

B.

password hash

Answers
C.

adding a timestamp in requests

C.

adding a timestamp in requests

Answers
D.

OAuth

D.

OAuth

Answers
Suggested answer: A

Explanation:

Reference: https://yurisubach.com/2017/04/04/restful-api-security-principles/"Fail-safe defaultsAccess to any resource (like API endpoint) should be denied by default. Accessgranted only in case of specific permission.

Refer to the exhibit.

An engineer must configure and validate a CoPP policy that allows the network management server to monitor router R1 via SNMP while protecting the control plane. Which two commands or command sets must be used? (Choose two.)

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
E.


E.


Answers
Suggested answer: A, E
Total 983 questions
Go to page: of 99