ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 40

Question list
Search
Search

Related questions











How do EIGRP metrics compare to OSPF metrics?

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

A.

EIGRP metrics are based on a combination of bandwidth and packet loss, and OSPF metrics are based on interface bandwidth.

Answers
B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

B.

EIGRP uses the Dijkstra algorithm, and OSPF uses The DUAL algorithm

Answers
C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

C.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is undefined

Answers
D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

D.

The EIGRP administrative distance for external routes is 170. and the OSPF administrative distance for external routes is 110

Answers
Suggested answer: A

Refer to the exhibit.

A network engineer must log in to the router via the console, but the RADIUS servers are not reachable Which credentials allow console access1?

A.

the username "cisco" and the password "Cisco"

A.

the username "cisco" and the password "Cisco"

Answers
B.

no username and only the password "test123"

B.

no username and only the password "test123"

Answers
C.

no username and only the password "cisco123"

C.

no username and only the password "cisco123"

Answers
D.

the username "cisco" and the password "cisco123"

D.

the username "cisco" and the password "cisco123"

Answers
Suggested answer: D


Refer to the exhibit .

Which command must be configured for RESTCONF to operate on port 8888?

A.

ip http port 8888

A.

ip http port 8888

Answers
B.

restconf port 8888

B.

restconf port 8888

Answers
C.

ip http restconf port 8888

C.

ip http restconf port 8888

Answers
D.

restconf http port 8888

D.

restconf http port 8888

Answers
Suggested answer: A

What Is a characteristic of a WLC that is in master controller mode?

A.

All wireless LAN controllers are managed by the master controller.

A.

All wireless LAN controllers are managed by the master controller.

Answers
B.

All new APs that join the WLAN are assigned to the master controller.

B.

All new APs that join the WLAN are assigned to the master controller.

Answers
C.

Configuration on the master controller is executed on all wireless LAN controllers.

C.

Configuration on the master controller is executed on all wireless LAN controllers.

Answers
D.

The master controller is responsible for load balancing all connecting clients to other controllers

D.

The master controller is responsible for load balancing all connecting clients to other controllers

Answers
Suggested answer: B

Explanation:

When should I use the master controller mode on a WLC? – When there is a master controller enabled, all newly added access points with no primary, secondary, or tertiary controllers assigned associate with the master controller on the same subnet.Reference: https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan- controllers/69561-wlc-faq.html

Refer to the exhibit.

Object tracking has been configured for VRRP-enabled routers Edge-01 and Edge-02 Which commands cause Edge-02 to preempt Edge-01 in the event that interface G0/0 goes down on Edge- 01?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Which feature Is used to propagate ARP broadcast, and link-local frames across a Cisco SD-Access fabric to address connectivity needs for silent hosts that require reception of traffic to start communicating?

A.

Native Fabric Multicast

A.

Native Fabric Multicast

Answers
B.

Layer 2 Flooding

B.

Layer 2 Flooding

Answers
C.

SOA Transit

C.

SOA Transit

Answers
D.

Multisite Fabric

D.

Multisite Fabric

Answers
Suggested answer: B

Explanation:

Layer2 Flooding

Cisco SD-Access fabric provides many optimizations to improve unicast traffic flow, and to reduce the unnecessary flooding of data such as broadcasts. But, for some traffic and applications, it may be desirable to enable broadcast forwarding within the fabric.

By default, this is disabled in the Cisco SD-Access architecture. If broadcast, Link local multicast and Arp flooding is required, it must be specifically enabled on a per-subnet basis using Layer 2 flooding feature.

Layer 2 flooding can be used to forward broadcasts for certain traffic and application types which may require leveraging of Layer 2 connectivity, such as silent hosts, card readers, door locks, etc.

An engineer must configure an ACL that permits packets which include an ACK in the TCP header Which entry must be included in the ACL?

A.

access-list 10 permit ip any any eq 21 tcp-ack

A.

access-list 10 permit ip any any eq 21 tcp-ack

Answers
B.

access-list 110 permit tcp any any eq 21 tcp-ack

B.

access-list 110 permit tcp any any eq 21 tcp-ack

Answers
C.

access-list 10 permit tcp any any eq 21 established

C.

access-list 10 permit tcp any any eq 21 established

Answers
D.

access-list 110 permit tcp any any eq 21 established

D.

access-list 110 permit tcp any any eq 21 established

Answers
Suggested answer: D

Explanation:

The established keyword is only applicable to TCP access list entries to match TCP segments that have the ACK and/or RST control bit set (regardless of the source and destination ports), which assumes that a TCP connection has already been established in one direction only. Let’s see an example below:

Suppose you only want to allow the hosts inside your company to telnet to an outside server but not vice versa, you can simply use an - ”established” access-list like this:

access-list 100 permit tcp any any established

access-list 101 permit tcp any any eq telnet

!

interface S0/0

ip access-group 100 in

ip access-group 101 out

Note: Suppose host A wants to start communicating with host B using TCP. Before they can send real data, a three-way handshake must be established first. Let‘s see how this process takes place:

1. First host A will send a SYN message (a TCP segment with SYN flag set to 1, SYN is short for

SYNchronize) to indicate it wants to setup a connection with host B. This message includes a sequence (SEQ) number for tracking purpose. This sequence number can be any 32-bit number

(range from 0 to 232) so we use -”x” to represent it.

2. After receiving SYN message from host A, host B replies with SYN-ACK message (some books may call it -SYN/ACK? or -SYN, ACK? message. ACK is short for ACKnowledge). This message includes a SYN sequence number and an ACK number:

+ SYN sequence number (let‘s called it “y”) is a random number and does not have any relationship with Host A‘s SYN SEQ number.

+ ACK number is the next number of Host A‘s SYN sequence number it received, so we represent it with “x+1". It means -I received your part. Now send me the next part (x + 1)”.

The SYN-ACK message indicates host B accepts to talk to host A (via ACK part). And ask if host A still wants to talk to it as well (via SYN part).

3. After Host A received the SYN-ACK message from host B, it sends an ACK message with ACK number “y+1” to host B. This confirms host A still wants to talk to host B.

By default, which virtual MAC address does HSRP group 14 use?

A.

04.16.19.09.4c.0e

A.

04.16.19.09.4c.0e

Answers
B.

00:05:5e:19:0c:14

B.

00:05:5e:19:0c:14

Answers
C.

00:05:0c:07:ac:14

C.

00:05:0c:07:ac:14

Answers
D.

00:00:0c:07:ac:0e

D.

00:00:0c:07:ac:0e

Answers
Suggested answer: D

What is one characteristic of the Cisco SD-Access control plane?

A.

It is based on VXLAN technology.

A.

It is based on VXLAN technology.

Answers
B.

Each router processes every possible destination and route

B.

Each router processes every possible destination and route

Answers
C.

It allows host mobility only in the wireless network.

C.

It allows host mobility only in the wireless network.

Answers
D.

It stores remote routes in a centralized database server

D.

It stores remote routes in a centralized database server

Answers
Suggested answer: D

Explanation:

A control plane node maintains a host tracking database (HTDB), and also uses Locator/ID Separation Protocol (LISP) to provide a map server, populating the HTDB from fabric edge registration messages; and a map resolver to respond to queries from edge devices requesting location information about destination nodes.

What is used to validate the authenticity of the client and is sent in HTTP requests as a JSON object?

A.

SSH

A.

SSH

Answers
B.

HTTPS

B.

HTTPS

Answers
C.

JWT

C.

JWT

Answers
D.

TLS

D.

TLS

Answers
Suggested answer: C
Total 983 questions
Go to page: of 99