ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 4

Question list
Search
Search

Related questions











Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?

A.

MTU

A.

MTU

Answers
B.

Window size

B.

Window size

Answers
C.

MRU

C.

MRU

Answers
D.

MSS

D.

MSS

Answers
Suggested answer: D

Explanation:

The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.

TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints.

PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is

What is a benefit of data modeling languages like YANG?

A.

They enable programmers to change or write their own application within the device operating system.

A.

They enable programmers to change or write their own application within the device operating system.

Answers
B.

They create more secure and efficient SNMP OIDs.

B.

They create more secure and efficient SNMP OIDs.

Answers
C.

They make the CLI simpler and more efficient.

C.

They make the CLI simpler and more efficient.

Answers
D.

They provide a standardized data structure, which results in configuration scalability and consistency.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Answers
Suggested answer: D

Explanation:

Yet Another Next Generation (YANG) is a language which is only used to describe data models

(structure). It is not XML or JSON.

Refer to exhibit.

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

A.

SW1 (config)#vtp pruning

A.

SW1 (config)#vtp pruning

Answers
B.

SW3(config)#vtp mode transparent

B.

SW3(config)#vtp mode transparent

Answers
C.

SW2(config)=vtp pruning

C.

SW2(config)=vtp pruning

Answers
D.

SW1 (config >»vtp mode transparent

D.

SW1 (config >»vtp mode transparent

Answers
Suggested answer: A

Explanation:

SW3 does not have VLAN 60 so it should not receive traffic for this VLAN (sent from SW2).

Therefore we should configure VTP Pruning on SW3 so that SW2 does not forward VLAN 60 traffic to SW3. Also notice that we need to configure pruning on SW1 (the VTP Server), not SW2.

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

A.

A NETCONF request was made for a data model that does not exist.

A.

A NETCONF request was made for a data model that does not exist.

Answers
B.

The device received a valid NETCONF request and serviced it without error.

B.

The device received a valid NETCONF request and serviced it without error.

Answers
C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

Answers
D.

The NETCONF running datastore is currently locked.

D.

The NETCONF running datastore is currently locked.

Answers
Suggested answer: A

Explanation:

Reference: https://www.cisco.com/c/en/us/support/docs/storagenetworking/management/200933-YANG-NETCONF-Configuration-Validation.html

Which LISP component is required for a LISP site to communicate with a non-LISP site?

A.

ETR

A.

ETR

Answers
B.

ITR

B.

ITR

Answers
C.

Proxy ETR

C.

Proxy ETR

Answers
D.

Proxy ITR

D.

Proxy ITR

Answers
Suggested answer: C

Which data is properly formatted with JSON?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

How are the different versions of IGMP compatible?

A.

IGMPv2 is compatible only with IGMPv1.

A.

IGMPv2 is compatible only with IGMPv1.

Answers
B.

IGMPv2 is compatible only with IGMPv2.

B.

IGMPv2 is compatible only with IGMPv2.

Answers
C.

IGMPv3 is compatible only with IGMPv3.

C.

IGMPv3 is compatible only with IGMPv3.

Answers
D.

IGMPv3 is compatible only with IGMPv1

D.

IGMPv3 is compatible only with IGMPv1

Answers
Suggested answer: A

Refer to the exhibit.

Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Explanation:

With BGP, we must advertise the correct network and subnet mask in the "network" command (in this case network 10.1.1.0/24 on R1 and network 10.2.2.0/24 on R2). BGP is very strict in the routing advertisements. In other words, BGP only advertises the network which exists exactly in the routing table. In this case, if you put the command "network x.x.0.0 mask 255.255.0.0" or "network x.0.0.0 mask 255.0.0.0" or "network x.x.x.x mask 255.255.255.255" then BGP will not advertise anything.

It is easy to establish eBGP neighborship via the direct link. But let's see what are required when we want to establish eBGP neighborship via their loopback interfaces. We will need two commands:

+ the command "neighbor 10.1.1.1 ebgp-multihop 2" on R1 and "neighbor 10.2.2.2 ebgpmultihop 2" on R1. This command increases the TTL value to 2 so that BGP updates can reach the BGP neighbor which is two hops away.

+ Answer 'R1 (config) #router bgp 1

R1 (config-router) #neighbor 192.168.10.2 remote-as 2

R1 (config-router) #network 10.1.1.0 mask 255.255.255.0

R2 (config) #router bgp 2

R2 (config-router) #neighbor 192.168.10.1 remote-as 1

R2 (config-router) #network 10.2.2.0 mask 255.255.255.0

Quick Wireless Summary

Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight + Autonomous: self-sufficient and standalone. Used for small wireless networks.

+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to function.

LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.

– Control and Provisioning for Wireless Access Point (CAPWAP) is an IETF standard for control messaging for setup, authentication and operations between APs and WLCs. CAPWAP is similar to LWAPP except the following differences:

+CAPWAP uses Datagram Transport Layer Security (DTLS) for authentication and encryption to protect traffic between APs and controllers. LWAPP uses AES.

+ CAPWAP has a dynamic maximum transmission unit (MTU) discovery mechanism.

+ CAPWAP runs on UDP ports 5246 (control messages) and 5247 (data messages) An LAP operates in one of six different modes:

+ Local mode (default mode): measures noise floor and interference, and scans for intrusion detection (IDS) events every 180 seconds on unused channels + FlexConnect, formerly known as Hybrid Remote Edge AP (H-REAP), mode:

allows data traffic to be switched locally and not go back to the controller. The FlexConnect AP can perform standalone client authentication and switch VLAN traffic locally even when it's disconnected to the WLC (Local Switched).

FlexConnect AP can also tunnel (via CAPWAP) both user wireless data and control traffic to a centralized WLC (Central Switched).

+ Monitor mode: does not handle data traffic between clients and the infrastructure. It acts like a sensor for location-based services (LBS), rogue AP detection, and IDS + Rogue detector mode: monitor for rogue APs. It does not handle data at all.

+ Sniffer mode: run as a sniffer and captures and forwards all the packets on a particular channel to a remote machine where you can use protocol analysis tool (Wireshark, Airopeek, etc) to review the packets and diagnose issues. Strictly used for troubleshooting purposes.

+ Bridge mode: bridge together the WLAN and the wired infrastructure together.

Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN controller. But this solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated

WLC. A Mobility Express WLC can support up to 100 Aps

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

A.

It is leveraged for dynamic endpoint to group mapping and policy definition.

A.

It is leveraged for dynamic endpoint to group mapping and policy definition.

Answers
B.

It provides GUI management and abstraction via apps that share context.

B.

It provides GUI management and abstraction via apps that share context.

Answers
C.

it is used to analyze endpoint to app flows and monitor fabric status.

C.

it is used to analyze endpoint to app flows and monitor fabric status.

Answers
D.

It manages the LISP EID database.

D.

It manages the LISP EID database.

Answers
Suggested answer: A

Which encryption hashing algorithm does NTP use for authentication?

A.

SSL

A.

SSL

Answers
B.

MD5

B.

MD5

Answers
C.

AES128

C.

AES128

Answers
D.

AES256

D.

AES256

Answers
Suggested answer: B

Explanation:

An example of configuring NTP authentication is shown below:

Router1(config)#ntp authentication-key 2 md5 itexamanswers

Router1(config)#ntp authenticate

Router1(config)#ntp trusted-key 2

Total 983 questions
Go to page: of 99