ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 37

Question list
Search
Search

Related questions











Refer to the exhibit.

R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?

A.

The DF bit has been set

A.

The DF bit has been set

Answers
B.

The maximum packet size accepted by the command is 147G bytes

B.

The maximum packet size accepted by the command is 147G bytes

Answers
C.

R2 and R3 do not have an OSPF adjacency

C.

R2 and R3 do not have an OSPF adjacency

Answers
D.

R3 is missing a return route to 10.99.69.0/30

D.

R3 is missing a return route to 10.99.69.0/30

Answers
Suggested answer: A

Explanation:

If the DF bit is set, routers cannot fragment packets. From the output below, we learn that the maximum MTU of R2 is 1492 bytes while we sent ping with 1500 bytes.

Therefore these ICMP packets were dropped.

Note: Record option displays the address(es) of the hops (up to nine) the packet goes through.

A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny

172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

A.

distribute-list prefix OFFICE in under the OSPF process

A.

distribute-list prefix OFFICE in under the OSPF process

Answers
B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

B.

Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32

Answers
C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

C.

ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32

Answers
D.

distribute-list OFFICE out under the OSPF process

D.

distribute-list OFFICE out under the OSPF process

Answers
E.

distribute-list OFFICE in under the OSPF process

E.

distribute-list OFFICE in under the OSPF process

Answers
Suggested answer: A, B

Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

A.

manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node

Answers
B.

coordinates configuration of autonomous nonfabric access points within the fabric

B.

coordinates configuration of autonomous nonfabric access points within the fabric

Answers
C.

performs the assurance engine role for both wired and wireless clients

C.

performs the assurance engine role for both wired and wireless clients

Answers
D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

D.

is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric

Answers
Suggested answer: A

Explanation:

Fabric Enabled WLC:

Fabric enabled WLC is integrated with LISP control plane. This WLC is responsible for AP image /Config, Radio Resource Management, Client Session management and roaming and all other wireless control plane functions.

For WLC Fabric Integration:

Wireless Client MAC address is used as EID

It inform about Wireless MAC address with its other information like SGT and Virtual Network Information VN information is mapped to VLAN on FEs WLC is responsible for updating Host Database tracking DB with roaming information

What is a TLOC in a Cisco SD-WAN deployment?

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

A.

value that identifies a specific tunnel within the Cisco SD-WAN overlay

Answers
B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

B.

identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay

Answers
C.

attribute that acts as a next hop for network prefixes

C.

attribute that acts as a next hop for network prefixes

Answers
D.

component set by the administrator to differentiate similar nodes that offer a common service

D.

component set by the administrator to differentiate similar nodes that offer a common service

Answers
Suggested answer: D

Explanation:

A TLOC is a Transport Locator that represents an attachment point where a Cisco WAN Edge device connects to a WAN transport. A TLOC is uniquely identified by a tuple of three values - (System-IP address, Color, Encapsulation).

A TLOC route consists of all required information needed by a remote peer in order to establish an overlay tunnel with that TLOC. This includes private and public IP addresses and ports, site-id, preference, weight, status, encapsulation info such as encryption and authentication parameters, and much more.

Refer to the exhibit.

Which commands are required to allow SSH connection to the router?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)

A.

NFS share

A.

NFS share

Answers
B.

non-linux server

B.

non-linux server

Answers
C.

local server

C.

local server

Answers
D.

remote server

D.

remote server

Answers
E.

bare metal server

E.

bare metal server

Answers
Suggested answer: A, E

Explanation:

Cisco DNA Center creates the backup files and posts them to a remote server. Each backup is uniquely stored using the UUID as the directory name.To support Assurance data backups, the server must be a Linux-based NFS server that meets the following requirements:

– Support NFS v4 and NFS v3.

– Cisco DNA Center stores backup copies of Assurance data on an external NFS device and automation data on an external remote sync (rsync) target location.

– The remote share for backing up an Assurance database (NDP) must be an NFS share.

Reference: https://www.cisco.com/c/en/us/td/docs/cloud-systems-management/networkautomation-and-management/dna-center/2-1-2/admin_guide/b_cisco_dna_center_admin_guide_2_1_2/

b_cisco_dna_center_admin_guide_2_1_1_chapter_0110.html

Refer the exhibit.

Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

What are the main components of Cisco TrustSec?

A.

Cisco ISE and Enterprise Directory Services

A.

Cisco ISE and Enterprise Directory Services

Answers
B.

Cisco ISE. network switches, firewalls, and routers

B.

Cisco ISE. network switches, firewalls, and routers

Answers
C.

Cisco ISE and TACACS+

C.

Cisco ISE and TACACS+

Answers
D.

Cisco ASA and Cisco Firepower Threat Defense

D.

Cisco ASA and Cisco Firepower Threat Defense

Answers
Suggested answer: B

Which three resources must the hypervisor make available to the virtual machines? (Choose three)

A.

memory

A.

memory

Answers
B.

bandwidth

B.

bandwidth

Answers
C.

IP address

C.

IP address

Answers
D.

processor

D.

processor

Answers
E.

storage

E.

storage

Answers
F.

secure access

F.

secure access

Answers
Suggested answer: A, D, E
Total 983 questions
Go to page: of 99