Cisco 350-401 Practice Test - Questions Answers, Page 4

List of questions
Question 31

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
MTU
Window size
MRU
MSS
The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.
TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints.
PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is
Question 32

What is a benefit of data modeling languages like YANG?
They enable programmers to change or write their own application within the device operating system.
They create more secure and efficient SNMP OIDs.
They make the CLI simpler and more efficient.
They provide a standardized data structure, which results in configuration scalability and consistency.
Yet Another Next Generation (YANG) is a language which is only used to describe data models
(structure). It is not XML or JSON.
Question 33

Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
SW1 (config)#vtp pruning
SW3(config)#vtp mode transparent
SW2(config)=vtp pruning
SW1 (config >»vtp mode transparent
SW3 does not have VLAN 60 so it should not receive traffic for this VLAN (sent from SW2).
Therefore we should configure VTP Pruning on SW3 so that SW2 does not forward VLAN 60 traffic to SW3. Also notice that we need to configure pruning on SW1 (the VTP Server), not SW2.
Question 34

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
A NETCONF request was made for a data model that does not exist.
The device received a valid NETCONF request and serviced it without error.
A NETCONF message with valid content based on the YANG data models was made, but the request failed.
The NETCONF running datastore is currently locked.
Reference: https://www.cisco.com/c/en/us/support/docs/storagenetworking/management/200933-YANG-NETCONF-Configuration-Validation.html
Question 35

Which LISP component is required for a LISP site to communicate with a non-LISP site?
ETR
ITR
Proxy ETR
Proxy ITR
Question 36

Which data is properly formatted with JSON?
Question 37

How are the different versions of IGMP compatible?
IGMPv2 is compatible only with IGMPv1.
IGMPv2 is compatible only with IGMPv2.
IGMPv3 is compatible only with IGMPv3.
IGMPv3 is compatible only with IGMPv1
Question 38

Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
With BGP, we must advertise the correct network and subnet mask in the "network" command (in this case network 10.1.1.0/24 on R1 and network 10.2.2.0/24 on R2). BGP is very strict in the routing advertisements. In other words, BGP only advertises the network which exists exactly in the routing table. In this case, if you put the command "network x.x.0.0 mask 255.255.0.0" or "network x.0.0.0 mask 255.0.0.0" or "network x.x.x.x mask 255.255.255.255" then BGP will not advertise anything.
It is easy to establish eBGP neighborship via the direct link. But let's see what are required when we want to establish eBGP neighborship via their loopback interfaces. We will need two commands:
+ the command "neighbor 10.1.1.1 ebgp-multihop 2" on R1 and "neighbor 10.2.2.2 ebgpmultihop 2" on R1. This command increases the TTL value to 2 so that BGP updates can reach the BGP neighbor which is two hops away.
+ Answer 'R1 (config) #router bgp 1
R1 (config-router) #neighbor 192.168.10.2 remote-as 2
R1 (config-router) #network 10.1.1.0 mask 255.255.255.0
R2 (config) #router bgp 2
R2 (config-router) #neighbor 192.168.10.1 remote-as 1
R2 (config-router) #network 10.2.2.0 mask 255.255.255.0
Quick Wireless Summary
Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight + Autonomous: self-sufficient and standalone. Used for small wireless networks.
+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to function.
LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.
– Control and Provisioning for Wireless Access Point (CAPWAP) is an IETF standard for control messaging for setup, authentication and operations between APs and WLCs. CAPWAP is similar to LWAPP except the following differences:
+CAPWAP uses Datagram Transport Layer Security (DTLS) for authentication and encryption to protect traffic between APs and controllers. LWAPP uses AES.
+ CAPWAP has a dynamic maximum transmission unit (MTU) discovery mechanism.
+ CAPWAP runs on UDP ports 5246 (control messages) and 5247 (data messages) An LAP operates in one of six different modes:
+ Local mode (default mode): measures noise floor and interference, and scans for intrusion detection (IDS) events every 180 seconds on unused channels + FlexConnect, formerly known as Hybrid Remote Edge AP (H-REAP), mode:
allows data traffic to be switched locally and not go back to the controller. The FlexConnect AP can perform standalone client authentication and switch VLAN traffic locally even when it's disconnected to the WLC (Local Switched).
FlexConnect AP can also tunnel (via CAPWAP) both user wireless data and control traffic to a centralized WLC (Central Switched).
+ Monitor mode: does not handle data traffic between clients and the infrastructure. It acts like a sensor for location-based services (LBS), rogue AP detection, and IDS + Rogue detector mode: monitor for rogue APs. It does not handle data at all.
+ Sniffer mode: run as a sniffer and captures and forwards all the packets on a particular channel to a remote machine where you can use protocol analysis tool (Wireshark, Airopeek, etc) to review the packets and diagnose issues. Strictly used for troubleshooting purposes.
+ Bridge mode: bridge together the WLAN and the wired infrastructure together.
Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN controller. But this solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated
WLC. A Mobility Express WLC can support up to 100 Aps
Question 39

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
It is leveraged for dynamic endpoint to group mapping and policy definition.
It provides GUI management and abstraction via apps that share context.
it is used to analyze endpoint to app flows and monitor fabric status.
It manages the LISP EID database.
Question 40

Which encryption hashing algorithm does NTP use for authentication?
SSL
MD5
AES128
AES256
An example of configuring NTP authentication is shown below:
Router1(config)#ntp authentication-key 2 md5 itexamanswers
Router1(config)#ntp authenticate
Router1(config)#ntp trusted-key 2
Question