ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 41

Question list
Search
Search

Related questions











In a Cisco SD-Access wireless architecture which device manages endpoint ID to edge node bindings?

A.

fabric control plane node

A.

fabric control plane node

Answers
B.

fabric wireless controller

B.

fabric wireless controller

Answers
C.

fabric border node

C.

fabric border node

Answers
D.

fabric edge node

D.

fabric edge node

Answers
Suggested answer: A

Explanation:

SD-Access Wireless Architecture Control Plane Node –A Closer Look

Fabric Control-Plane Node is based on a LISP Map Server / Resolver

Runs the LISP Endpoint ID Database to provide overlay reachability information + A simple Host Database, that tracks Endpoint ID to Edge Node bindings (RLOCs)+ Host Database supports multiple types of Endpoint ID (EID), such as IPv4/32, IPv6 /128* or MAC/48 + Receives prefix registrations from Edge Nodes for wired clients, and from Fabric mode WLCs for wireless clients + Resolves lookup requests from FE to locate Endpoints + Updates Fabric Edge nodes, Border nodes with wireless client mobility and RLOC information

If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power level effectively doubles the transmit power?

A.

13dBm

A.

13dBm

Answers
B.

14 dBm

B.

14 dBm

Answers
C.

17dBm

C.

17dBm

Answers
D.

20 dBm

D.

20 dBm

Answers
Suggested answer: A

Explanation:

Suppose a transmitter is configured for a power level of 10 dBm. A cable with 5-dB loss connects the transmitter to an antenna with an 8-dBi gain. The resulting EIRP of the system is EIRP = 10 dBm – 5 dB + 8 dBi = 13 dBm

What is the API keys option for REST API authentication?

A.

a predetermined string that is passed from client to server

A.

a predetermined string that is passed from client to server

Answers
B.

a one-time encrypted token

B.

a one-time encrypted token

Answers
C.

a username that is stored in the local router database

C.

a username that is stored in the local router database

Answers
D.

a credential that is transmitted unencrypted

D.

a credential that is transmitted unencrypted

Answers
Suggested answer: A

Which two Cisco SD-Access components provide communication between traditional network elements and controller layer? (choose two)

A.

network data platform

A.

network data platform

Answers
B.

network underlay

B.

network underlay

Answers
C.

fabric overlay

C.

fabric overlay

Answers
D.

network control platform

D.

network control platform

Answers
E.

partner ecosystem

E.

partner ecosystem

Answers
Suggested answer: B, C

What is an OVF?

A.

a package that is similar to an IMG and that contains an OVA file used to build a virtual machine

A.

a package that is similar to an IMG and that contains an OVA file used to build a virtual machine

Answers
B.

an alternative form of an ISO that Is used to install the base operating system of a virtual machine

B.

an alternative form of an ISO that Is used to install the base operating system of a virtual machine

Answers
C.

the third step in a P2V migration

C.

the third step in a P2V migration

Answers
D.

a package of files that is used to describe a virtual machine or virtual appliance

D.

a package of files that is used to describe a virtual machine or virtual appliance

Answers
Suggested answer: D

What is a characteristic of a type 2 hypervisor?

A.

ideal for data center

A.

ideal for data center

Answers
B.

complicated deployment

B.

complicated deployment

Answers
C.

ideal for client/end-user system

C.

ideal for client/end-user system

Answers
D.

referred to as bare-metal

D.

referred to as bare-metal

Answers
Suggested answer: A

Refer to the exhibit.

An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without sending OSPF packets to SW1 Which command set should be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

Refer to the exhibit.

An engineer configures routing between all routers and must build a configuration to connect R1 to R3 via a GRE tunnel Which configuration must be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

Refer to the exhibit.

How should the script be completed so that each device configuration is saved into a JSON-formatted file under the device name?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Which option works with a DHCP server to return at least one WLAN management interface IP address during the discovery phase and is dependent upon the VCI of the AP?

A.

Option 42

A.

Option 42

Answers
B.

Option 15

B.

Option 15

Answers
C.

Option 125

C.

Option 125

Answers
D.

Option 43

D.

Option 43

Answers
Suggested answer: D
Total 983 questions
Go to page: of 99