ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 4

Add to Whishlist

List of questions

Question 31

Report Export Collapse

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?

MTU

MTU

Window size

Window size

MRU

MRU

MSS

MSS

Suggested answer: D
Explanation:

The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.

TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints.

PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is

asked 10/10/2024
William Hopson
35 questions

Question 32

Report Export Collapse

What is a benefit of data modeling languages like YANG?

They enable programmers to change or write their own application within the device operating system.

They enable programmers to change or write their own application within the device operating system.

They create more secure and efficient SNMP OIDs.

They create more secure and efficient SNMP OIDs.

They make the CLI simpler and more efficient.

They make the CLI simpler and more efficient.

They provide a standardized data structure, which results in configuration scalability and consistency.

They provide a standardized data structure, which results in configuration scalability and consistency.

Suggested answer: D
Explanation:

Yet Another Next Generation (YANG) is a language which is only used to describe data models

(structure). It is not XML or JSON.

asked 10/10/2024
Alice Smith
48 questions

Question 33

Report Export Collapse

Refer to exhibit.

Cisco 350-401 image Question 33 115332 10102024232942000000

VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?

SW1 (config)#vtp pruning

SW1 (config)#vtp pruning

SW3(config)#vtp mode transparent

SW3(config)#vtp mode transparent

SW2(config)=vtp pruning

SW2(config)=vtp pruning

SW1 (config >»vtp mode transparent

SW1 (config >»vtp mode transparent

Suggested answer: A
Explanation:

SW3 does not have VLAN 60 so it should not receive traffic for this VLAN (sent from SW2).

Therefore we should configure VTP Pruning on SW3 so that SW2 does not forward VLAN 60 traffic to SW3. Also notice that we need to configure pruning on SW1 (the VTP Server), not SW2.

asked 10/10/2024
John Hammonds
42 questions

Question 34

Report Export Collapse

Cisco 350-401 image Question 34 115333 10102024232942000000

Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

A NETCONF request was made for a data model that does not exist.

A NETCONF request was made for a data model that does not exist.

The device received a valid NETCONF request and serviced it without error.

The device received a valid NETCONF request and serviced it without error.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

The NETCONF running datastore is currently locked.

The NETCONF running datastore is currently locked.

Suggested answer: A
Explanation:

Cisco 350-401 image Question 34 explanation 115333 10102024232942000000

Reference: https://www.cisco.com/c/en/us/support/docs/storagenetworking/management/200933-YANG-NETCONF-Configuration-Validation.html

asked 10/10/2024
Jialu Wang
39 questions

Question 35

Report Export Collapse

Which LISP component is required for a LISP site to communicate with a non-LISP site?

ETR

ETR

ITR

ITR

Proxy ETR

Proxy ETR

Proxy ITR

Proxy ITR

Suggested answer: C
asked 10/10/2024
HNO Oo
42 questions

Question 36

Report Export Collapse

Which data is properly formatted with JSON?


Cisco 350-401 image Question 36 Answer 1 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 1 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 2 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 2 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 3 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 3 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 4 115335 10102024232942000000


Cisco 350-401 image Question 36 Answer 4 115335 10102024232942000000

Suggested answer: A
asked 10/10/2024
Mitchell Mansfield
34 questions

Question 37

Report Export Collapse

How are the different versions of IGMP compatible?

IGMPv2 is compatible only with IGMPv1.

IGMPv2 is compatible only with IGMPv1.

IGMPv2 is compatible only with IGMPv2.

IGMPv2 is compatible only with IGMPv2.

IGMPv3 is compatible only with IGMPv3.

IGMPv3 is compatible only with IGMPv3.

IGMPv3 is compatible only with IGMPv1

IGMPv3 is compatible only with IGMPv1

Suggested answer: A
asked 10/10/2024
Manuel Guerrero Rojas
40 questions

Question 38

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 38 115337 10102024232942000000

Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?


Cisco 350-401 image Question 38 Answer 1 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 1 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 2 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 2 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 3 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 3 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 4 115337 10102024232942000000


Cisco 350-401 image Question 38 Answer 4 115337 10102024232942000000

Suggested answer: A
Explanation:

With BGP, we must advertise the correct network and subnet mask in the "network" command (in this case network 10.1.1.0/24 on R1 and network 10.2.2.0/24 on R2). BGP is very strict in the routing advertisements. In other words, BGP only advertises the network which exists exactly in the routing table. In this case, if you put the command "network x.x.0.0 mask 255.255.0.0" or "network x.0.0.0 mask 255.0.0.0" or "network x.x.x.x mask 255.255.255.255" then BGP will not advertise anything.

It is easy to establish eBGP neighborship via the direct link. But let's see what are required when we want to establish eBGP neighborship via their loopback interfaces. We will need two commands:

+ the command "neighbor 10.1.1.1 ebgp-multihop 2" on R1 and "neighbor 10.2.2.2 ebgpmultihop 2" on R1. This command increases the TTL value to 2 so that BGP updates can reach the BGP neighbor which is two hops away.

+ Answer 'R1 (config) #router bgp 1

R1 (config-router) #neighbor 192.168.10.2 remote-as 2

R1 (config-router) #network 10.1.1.0 mask 255.255.255.0

R2 (config) #router bgp 2

R2 (config-router) #neighbor 192.168.10.1 remote-as 1

R2 (config-router) #network 10.2.2.0 mask 255.255.255.0

Quick Wireless Summary

Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight + Autonomous: self-sufficient and standalone. Used for small wireless networks.

+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to function.

LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.

– Control and Provisioning for Wireless Access Point (CAPWAP) is an IETF standard for control messaging for setup, authentication and operations between APs and WLCs. CAPWAP is similar to LWAPP except the following differences:

+CAPWAP uses Datagram Transport Layer Security (DTLS) for authentication and encryption to protect traffic between APs and controllers. LWAPP uses AES.

+ CAPWAP has a dynamic maximum transmission unit (MTU) discovery mechanism.

+ CAPWAP runs on UDP ports 5246 (control messages) and 5247 (data messages) An LAP operates in one of six different modes:

+ Local mode (default mode): measures noise floor and interference, and scans for intrusion detection (IDS) events every 180 seconds on unused channels + FlexConnect, formerly known as Hybrid Remote Edge AP (H-REAP), mode:

allows data traffic to be switched locally and not go back to the controller. The FlexConnect AP can perform standalone client authentication and switch VLAN traffic locally even when it's disconnected to the WLC (Local Switched).

FlexConnect AP can also tunnel (via CAPWAP) both user wireless data and control traffic to a centralized WLC (Central Switched).

+ Monitor mode: does not handle data traffic between clients and the infrastructure. It acts like a sensor for location-based services (LBS), rogue AP detection, and IDS + Rogue detector mode: monitor for rogue APs. It does not handle data at all.

+ Sniffer mode: run as a sniffer and captures and forwards all the packets on a particular channel to a remote machine where you can use protocol analysis tool (Wireshark, Airopeek, etc) to review the packets and diagnose issues. Strictly used for troubleshooting purposes.

+ Bridge mode: bridge together the WLAN and the wired infrastructure together.

Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN controller. But this solution is only suitable for small to midsize, or multi-site branch locations where you might not want to invest in a dedicated

WLC. A Mobility Express WLC can support up to 100 Aps

asked 10/10/2024
Dinu Jose Varghese
45 questions

Question 39

Report Export Collapse

In a Cisco SD-Access solution, what is the role of the Identity Services Engine?

It is leveraged for dynamic endpoint to group mapping and policy definition.

It is leveraged for dynamic endpoint to group mapping and policy definition.

It provides GUI management and abstraction via apps that share context.

It provides GUI management and abstraction via apps that share context.

it is used to analyze endpoint to app flows and monitor fabric status.

it is used to analyze endpoint to app flows and monitor fabric status.

It manages the LISP EID database.

It manages the LISP EID database.

Suggested answer: A
asked 10/10/2024
Siraj Moosa
42 questions

Question 40

Report Export Collapse

Which encryption hashing algorithm does NTP use for authentication?

SSL

SSL

MD5

MD5

AES128

AES128

AES256

AES256

Suggested answer: B
Explanation:

An example of configuring NTP authentication is shown below:

Router1(config)#ntp authentication-key 2 md5 itexamanswers

Router1(config)#ntp authenticate

Router1(config)#ntp trusted-key 2

asked 10/10/2024
Javier Cardaba Enjuto
44 questions
Total 983 questions
Go to page: of 99

Related questions