ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 36

Question list
Search
Search

Related questions











What are two benefits of implementing a Cisco SD-WAN architecture? (Choose two)

A.

It provides resilient and effective traffic flow using MPLS.

A.

It provides resilient and effective traffic flow using MPLS.

Answers
B.

It improves endpoint protection by integrating embedded and cloud security features.

B.

It improves endpoint protection by integrating embedded and cloud security features.

Answers
C.

It allows configuration of application-aware policies with real time enforcement.

C.

It allows configuration of application-aware policies with real time enforcement.

Answers
D.

It simplifies endpoint provisioning through standalone router management

D.

It simplifies endpoint provisioning through standalone router management

Answers
E.

It enforces a single. scalable. hub-and-spoke topology.

E.

It enforces a single. scalable. hub-and-spoke topology.

Answers
Suggested answer: C, D

Explanation:

The top SD-WAN benefits are:

+ Increased bandwidth at a lower cost

+ Centralized management across branch networks

+ Full visibility into the network

+ Providing organizations with more connection type options and vendor selection when building a network.

Reference: https://www.sdxcentral.com/networking/sd-wan/definitions/sd-wan-technology/-> We can provision endpoints (vEdges) through a centralized router vManage -> Answer D is correct.

Answer A is not correct as we can use different kind of connections on SD-WAN: MPLS, LTE, 4G, xDSL, Internet connections… Application-Aware Routing policy is configured in vManage as a centralized data policy that maps the serviceside application(s) to specific SLA requirements. The centralized policies provisioned in vSmart controller is pushed to relevant WAN Edge devices for enforcement. The defined policy consists of match-action pairs, where the match statement defines the application-list or the type of traffic to match, and the action statement defines the SLA action the WAN Edge devices must enforce for the specified traffic.

Reference: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/SDWAN/cisco-sdwanapplication-awarerouting-deploy-guide.html

How does CEF switching differ from process switching on Cisco devices?

A.

CEF switching saves memory by sorting adjacency tables in dedicate memory on the line cards, and process switching stores all tables in the main memory

A.

CEF switching saves memory by sorting adjacency tables in dedicate memory on the line cards, and process switching stores all tables in the main memory

Answers
B.

CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table

B.

CEF switching uses adjacency tables built by the CDP protocol, and process switching uses the routing table

Answers
C.

CEF switching uses dedicated hardware processors, and process switching uses the main processor

C.

CEF switching uses dedicated hardware processors, and process switching uses the main processor

Answers
D.

CEF switching uses proprietary protocol based on IS-IS for MAC address lookup, and process switching uses in MAC address table

D.

CEF switching uses proprietary protocol based on IS-IS for MAC address lookup, and process switching uses in MAC address table

Answers
Suggested answer: B

Explanation:

Cisco Express Forwarding (CEF) switching is a proprietary form of scalable switching intended to tackle the problems associated with demand caching. With CEF switching, the information which is conventionally stored in a route cache is split up over several data structures. The CEF code is able to maintain these data structures in the Gigabit Route Processor (GRP), and also in slave processors such as the line cards in the 12000 routers. The data structures that provide optimized lookup for efficient packet forwarding include:

The Forwarding Information Base (FIB) table - CEF uses a FIB to make IP destination prefix-based switching decisions. The FIB is conceptually similar to a routing table or information base. It maintains a mirror image of the forwarding information contained in the IP routing table. When routing or topology changes occur in the network, the IP routing table is updated, and these changes are reflected in the FIB. The FIB maintains next-hop address information based on the information in the IP routing table.

Because there is a one-to-one correlation between FIB entries and routing table entries, the FIB contains all known routes and eliminates the need for route cache maintenance that is associated with switching paths such as fast switching and optimum switching.

Adjacency table - Nodes in the network are said to be adjacent if they can reach each other with a single hop across a link layer. In addition to the FIB, CEF uses adjacency tables to prepend Layer 2 addressing information. The adjacency table maintains Layer 2 next-hop addresses for all FIB entries.

CEF can be enabled in one of two modes:

Central CEF mode - When CEF mode is enabled, the CEF FIB and adjacency tables reside on the route processor, and the route processor performs the express forwarding. You can use CEF mode when line cards are not available for

CEF switching, or when you need to use features not compatible with distributed CEF switching.

Distributed CEF (dCEF) mode - When dCEF is enabled, line cards maintain identical copies of the FIB and adjacency tables. The line cards can perform the express forwarding by themselves, relieving the main processor - Gigabit Route

Processor (GRP) - of involvement in the switching operation. This is the only switching method available on the Cisco 12000 Series Router. dCEF uses an Inter-Process Communication (IPC) mechanism to ensure synchronization of FIBs and adjacency tables on the route processor and line cards.

For more information about CEF switching, see Cisco Express Forwarding (CEF) White Paper.

A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal

Employees can access the portal without any errors.

Which change must be implemented to allow the contractors and employees to access the portal?

A.

Install a trusted third-party certificate on the Cisco ISE.

A.

Install a trusted third-party certificate on the Cisco ISE.

Answers
B.

Install an Internal CA signed certificate on the contractor devices

B.

Install an Internal CA signed certificate on the contractor devices

Answers
C.

Install an internal CA signed certificate on the Cisco ISE

C.

Install an internal CA signed certificate on the Cisco ISE

Answers
D.

install a trusted third-party certificate on the contractor devices.

D.

install a trusted third-party certificate on the contractor devices.

Answers
Suggested answer: C

A client device roams between access points located on different floors in an atrium. The access points are Joined to the same controller and configured in local mode. The access points are in different AP groups and have different IP addresses, but the client VLAN in the groups is the same.

Which type of roam occurs?

A.

inter-controller

A.

inter-controller

Answers
B.

inter-subnet

B.

inter-subnet

Answers
C.

intra-VLAN

C.

intra-VLAN

Answers
D.

intra-controller

D.

intra-controller

Answers
Suggested answer: D

Explanation:

Mobility, or roaming, is a wireless LAN client's ability to maintain its association seamlessly from one access point to another securely and with as little latency as possible. Three popular types of client roaming are:

Intra-Controller Roaming: Each controller supports same-controller client roaming across access points managed by the same controller. This roaming is transparent to the client as the session is sustained, and the client continues using the same DHCP-assigned or client-assigned IP address.

Inter-Controller Roaming: Multiple-controller deployments support client roaming across access points managed by controllers in the same mobility group and on the same subnet. This roaming is also transparent to the client because the session is sustained and a tunnel between controllers allows the client to continue using the same DHCP- or client-assigned IP address as long as the session remains active.

Inter-Subnet Roaming: Multiple-controller deployments support client roaming across access points managed by controllers in the same mobility group on different subnets. This roaming is transparent to the client because the session is sustained and a tunnel between the controllers allows the client to continue using the same DHCP-assigned or client-assigned IP address as long as the session remains active.

Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDA TED_chapter_01100.htmlIn three types of client roaming above, only with Inter- Subnet Roaming thecontrollers are in different subnets.

Which Python code snippet must be added to the script to save the returned configuration as a JSONformatted file?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

How must network management traffic be treated when defining QoS policies?

A.

as delay-sensitive traffic in a low latency queue

A.

as delay-sensitive traffic in a low latency queue

Answers
B.

using minimal bandwidth guarantee

B.

using minimal bandwidth guarantee

Answers
C.

using the same marking as IP routing

C.

using the same marking as IP routing

Answers
D.

as best effort

D.

as best effort

Answers
Suggested answer: A

Explanation:

Low latency queuing (LLQ) adds a priority queue to CBWFQ from which delay-sensitive traffic, such as voice traffic, can be transmitted ahead of packets in other queues.

By configuring the quality of service (QoS), you can provide preferential treatment to specific types of traffic at the expense of other traffic types. Without QoS, the device offers best-effort service for each packet, regardless of the packet contents or size. The device sends the packets without any assurance of reliability, delay bounds, or throughput.

The following are specific features provided by QoS:

Low latency

Bandwidth guarantee

Buffering capabilities and dropping disciplines

Traffic policing

Enables the changing of the attribute of the frame or packet header

Relative services

Modular QoS Command-Line Interface

Supported QoS Features for Wired Access

Hierarchical QoS

What is one difference between EIGRP and OSPF?

A.

OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.

A.

OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.

Answers
B.

OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm

B.

OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm

Answers
C.

EIGRP uses the variance command lot unequal cost load balancing, and OSPF supports unequal cost balancing by default.

C.

EIGRP uses the variance command lot unequal cost load balancing, and OSPF supports unequal cost balancing by default.

Answers
D.

EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm

D.

EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm

Answers
Suggested answer: D

Explanation:

EIGRP is based on DUAL (Diffusing Update Algorithm) while OSPF uses Dijkstra's Shortest Path Algorithm with the major difference in how they calculate the shortest routing path.

OSPF has capability to calculate the best shortest path to each reachable subnet/network using an algorithm called SFP (Shortest Path First) also known as Dijkstra algorithm. "Neighbor Table" that contain all discovered OSPF neighbour with whom routing information will be interchanged.

Why would a log file contain a * next to the date?

A.

The network device was receiving NTP time when the log messages were recorded.

A.

The network device was receiving NTP time when the log messages were recorded.

Answers
B.

The network device was unable to reach The NTP server when the log messages were recorded

B.

The network device was unable to reach The NTP server when the log messages were recorded

Answers
C.

The network device is not configured to use NTP.

C.

The network device is not configured to use NTP.

Answers
D.

The network device is nor configured to use NTP time stamps for logging

D.

The network device is nor configured to use NTP time stamps for logging

Answers
Suggested answer: B

Which action is performed by Link Management Protocol in a Cisco StackWise Virtual domain?

A.

It rejects any unidirectional link traffic forwarding

A.

It rejects any unidirectional link traffic forwarding

Answers
B.

It determines if the hardware is compatible to form the StackWise Virtual domain

B.

It determines if the hardware is compatible to form the StackWise Virtual domain

Answers
C.

discovers the StackWise domain and brings up SVL interfaces.

C.

discovers the StackWise domain and brings up SVL interfaces.

Answers
D.

It determines which switch becomes active or standby

D.

It determines which switch becomes active or standby

Answers
Suggested answer: A

Explanation:

The Link Management Protocol (LMP) performs the following functions: + Verifies link integrity by establishing bidirectional traffic forwarding, and rejects any unidirectional links + Exchanges periodic hellos to monitor and maintain the health of the links + Negotiates the version of StackWise Virtual header between the switches StackWise Virtual link role resolution

Reference: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-9000/nb-06-cat-9k-stack-wp-cte-en.html

A customer transitions a wired environment to a Cisco SD-Access solution. The customer does not want to integrate the wireless network with the fabric. Which wireless deployment approach enables the two systems to coexist and meets the customer requirement?

A.

Deploy the APs in autonomous mode

A.

Deploy the APs in autonomous mode

Answers
B.

Deploy the wireless network over the top of the fabric

B.

Deploy the wireless network over the top of the fabric

Answers
C.

Deploy a separate network for the wireless environment

C.

Deploy a separate network for the wireless environment

Answers
D.

Implement a Cisco DNA Center to manage the two networks

D.

Implement a Cisco DNA Center to manage the two networks

Answers
Suggested answer: B
Total 983 questions
Go to page: of 99