Cisco 350-401 Practice Test - Questions Answers, Page 4
Related questions
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
MTU
Window size
MRU
MSS
What is a benefit of data modeling languages like YANG?
They enable programmers to change or write their own application within the device operating system.
They create more secure and efficient SNMP OIDs.
They make the CLI simpler and more efficient.
They provide a standardized data structure, which results in configuration scalability and consistency.
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN 50?
SW1 (config)#vtp pruning
SW3(config)#vtp mode transparent
SW2(config)=vtp pruning
SW1 (config >»vtp mode transparent
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco IOS device?
A NETCONF request was made for a data model that does not exist.
The device received a valid NETCONF request and serviced it without error.
A NETCONF message with valid content based on the YANG data models was made, but the request failed.
The NETCONF running datastore is currently locked.
Which LISP component is required for a LISP site to communicate with a non-LISP site?
ETR
ITR
Proxy ETR
Proxy ITR
How are the different versions of IGMP compatible?
IGMPv2 is compatible only with IGMPv1.
IGMPv2 is compatible only with IGMPv2.
IGMPv3 is compatible only with IGMPv3.
IGMPv3 is compatible only with IGMPv1
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
It is leveraged for dynamic endpoint to group mapping and policy definition.
It provides GUI management and abstraction via apps that share context.
it is used to analyze endpoint to app flows and monitor fabric status.
It manages the LISP EID database.
Which encryption hashing algorithm does NTP use for authentication?
SSL
MD5
AES128
AES256
Question