ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 35

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Which command must be applied to Router 1 to bring the GRE tunnel to an up/up state?

A.

Routed (config if funnel mode gre multipoint

A.

Routed (config if funnel mode gre multipoint

Answers
B.

Router1(config-if)&tunnel source Loopback0

B.

Router1(config-if)&tunnel source Loopback0

Answers
C.

Router1(config-if)#tunnel source GigabitEthernet0/1

C.

Router1(config-if)#tunnel source GigabitEthernet0/1

Answers
D.

Router1 (config)#interface tunnel0

D.

Router1 (config)#interface tunnel0

Answers
Suggested answer: B

Which method is used by an AP to join HA controllers and is configured in NVRAM?

A.

stored WLC information

A.

stored WLC information

Answers
B.

DNS

B.

DNS

Answers
C.

IP Helper Addresses

C.

IP Helper Addresses

Answers
D.

Primary/Secondary/Tertiary/Backup

D.

Primary/Secondary/Tertiary/Backup

Answers
Suggested answer: A

Explanation:

An AP can be "primed" with up to three controllers-a primary, a secondary, and a tertiary. These are stored in nonvolatile memory so that the AP can remember them after a reboot or power failure.

Refer to the exhibit.

A network engineer is enabling logging to a local buffer, to the terminal and to a syslog server for all debugging level logs filtered by facility code 7. Which command is needed to complete this configuration snippet?

A.

logging buffered debugging

A.

logging buffered debugging

Answers
B.

logging discriminator Disc1 severity includes 7

B.

logging discriminator Disc1 severity includes 7

Answers
C.

logging buffered discriminator Disc1 debugging

C.

logging buffered discriminator Disc1 debugging

Answers
D.

logging discriminator Disc1 severity includes 7 facility includes fac7

D.

logging discriminator Disc1 severity includes 7 facility includes fac7

Answers
Suggested answer: D

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

A.

Add a timestamp to the request In the API header.

A.

Add a timestamp to the request In the API header.

Answers
B.

Use a password hash

B.

Use a password hash

Answers
C.

Add OAuth to the request in the API header.

C.

Add OAuth to the request in the API header.

Answers
D.

UseHTTPS

D.

UseHTTPS

Answers
Suggested answer: B

When is the Design workflow used In Cisco DNA Center?

A.

in a greenfield deployment, with no existing infrastructure

A.

in a greenfield deployment, with no existing infrastructure

Answers
B.

in a greenfield or brownfield deployment, to wipe out existing data

B.

in a greenfield or brownfield deployment, to wipe out existing data

Answers
C.

in a brownfield deployment, to modify configuration of existing devices in the network

C.

in a brownfield deployment, to modify configuration of existing devices in the network

Answers
D.

in a brownfield deployment, to provision and onboard new network devices

D.

in a brownfield deployment, to provision and onboard new network devices

Answers
Suggested answer: A

Explanation:

The Design area is where you create the structure and framework of your network, including the physical topology, network settings, and device type profiles that you can apply to devices throughout your network. Use the Design workflow if you do not already have an existing infrastructure. If you have an existing infrastructure, use the Discovery feature.

https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/network-automation-andmanagement/dna-center/2-1-2/user_guide/b_cisco_dna_center_ug_2_1_2/b_cisco_dna_center_ug_2_1_1_chapter_0110.html

Reference: https://synoptek.com/insights/it-blogs/greenfield-vs-brownfield-software-development/"Greenfield development refers to developing a system for a totally new environment and requiresdevelopment from a clean slate – no legacy code around. It is an approach used when you're startingfresh and with no restrictions or dependencies."

Refer to the exhibit.

CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to CR1?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over the role of active router If the interlink with the primary switch fails. Which command set completes this task?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

Refer to the exhibit.

An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root cause for the failure between CORP and ISP#2?

A.

Router ISP#2 is configured to use SHA-1 authentication.

A.

Router ISP#2 is configured to use SHA-1 authentication.

Answers
B.

There is a password mismatch between router CORP and router ISP#2.

B.

There is a password mismatch between router CORP and router ISP#2.

Answers
C.

Router CORP is configured with an extended access control list.

C.

Router CORP is configured with an extended access control list.

Answers
D.

MD5 authorization is configured incorrectly on router ISP#2.

D.

MD5 authorization is configured incorrectly on router ISP#2.

Answers
Suggested answer: B

In which two ways does TCAM differ from CAM? (Choose two.)

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

A.

CAM is used to make Layer 2 forwarding decisions, and TCAM is used for Layer 3 address lookups.

Answers
B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

B.

The MAC address table is contained in CAM, and ACL and QoS Information Is stored in TCAM.

Answers
C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

C.

CAM Is used by routers for IP address lookups, and TCAM is used to make Layer 2 forwarding decisions.

Answers
D.

CAM is used for software switching mechanisms, and TCAM Is used for hardware switching mechanisms.

D.

CAM is used for software switching mechanisms, and TCAM Is used for hardware switching mechanisms.

Answers
E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

E.

The MAC address table Is contained in TCAM, and ACL and QoS information is stored in CAM.

Answers
Suggested answer: C, E
Total 983 questions
Go to page: of 99