Cisco 350-401 Practice Test - Questions Answers, Page 37
List of questions
Related questions
Refer to the exhibit.
R1 is able to ping the R3 fa0/1 Interface. Why do the extended pings fail?
The DF bit has been set
The maximum packet size accepted by the command is 147G bytes
R2 and R3 do not have an OSPF adjacency
R3 is missing a return route to 10.99.69.0/30
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny
172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)
distribute-list prefix OFFICE in under the OSPF process
Ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 Ie 32
ip prefix-list OFFICE seq 10 permit 0.0.0.0/0 ge 32
distribute-list OFFICE out under the OSPF process
distribute-list OFFICE in under the OSPF process
Which function does a fabric wireless LAN controller perform In a Cisco SD-Access deployment?
manages fabric-enabled APs and forwards client registration and roaming information to the Control Plane Node
coordinates configuration of autonomous nonfabric access points within the fabric
performs the assurance engine role for both wired and wireless clients
is dedicated to onboard clients in fabric-enabled and nonfabric-enabled APs within the fabric
What is a TLOC in a Cisco SD-WAN deployment?
value that identifies a specific tunnel within the Cisco SD-WAN overlay
identifier that represents a specific service offered by nodes within the Cisco SD-WAN overlay
attribute that acts as a next hop for network prefixes
component set by the administrator to differentiate similar nodes that offer a common service
Refer to the exhibit.
Which commands are required to allow SSH connection to the router?
Which two solutions are used for backing up a Cisco DNA Center Assurance database? (Choose two)
NFS share
non-linux server
local server
remote server
bare metal server
Refer the exhibit.
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
What are the main components of Cisco TrustSec?
Cisco ISE and Enterprise Directory Services
Cisco ISE. network switches, firewalls, and routers
Cisco ISE and TACACS+
Cisco ASA and Cisco Firepower Threat Defense
Which three resources must the hypervisor make available to the virtual machines? (Choose three)
memory
bandwidth
IP address
processor
storage
secure access
Question