ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 44

Question list
Search
Search

List of questions

Search

Related questions











Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?

A.

VXLAN

A.

VXLAN

Answers
B.

IS-IS

B.

IS-IS

Answers
C.

OSPF

C.

OSPF

Answers
D.

LISP

D.

LISP

Answers
Suggested answer: A

Which function does a fabric AP perform in a cisco SD-access deployment?

A.

It updates wireless clients' locations in the fabric

A.

It updates wireless clients' locations in the fabric

Answers
B.

It connects wireless clients to the fabric.

B.

It connects wireless clients to the fabric.

Answers
C.

It manages wireless clients' membership information in the fabric

C.

It manages wireless clients' membership information in the fabric

Answers
D.

It configures security policies down to wireless clients in the fabric.

D.

It configures security policies down to wireless clients in the fabric.

Answers
Suggested answer: B

Reter to the exhibit.

Refer to the exhibit. Which python code parses the response and prints "18:32:21.474 UTC sun Mar 10 2019?

A.

print(response['resut'][0||'simple_time']}

A.

print(response['resut'][0||'simple_time']}

Answers
B.

print(response[result']['body']['simple_time']}

B.

print(response[result']['body']['simple_time']}

Answers
C.

print(response['body']['simple_time']}

C.

print(response['body']['simple_time']}

Answers
D.

print(response[jresult']['body']['simple_time']}

D.

print(response[jresult']['body']['simple_time']}

Answers
Suggested answer: B

what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?

A.

better application performance

A.

better application performance

Answers
B.

Improved security because the underlying OS is eliminated

B.

Improved security because the underlying OS is eliminated

Answers
C.

Improved density and scalability

C.

Improved density and scalability

Answers
D.

ability to operate on hardware that is running other OSs

D.

ability to operate on hardware that is running other OSs

Answers
Suggested answer: D

Refer to the exhibit.

A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?

A.

aaa authentication login default group ISE-Servers local enable

A.

aaa authentication login default group ISE-Servers local enable

Answers
B.

aaa authentication login default group enable local ISE-Servers

B.

aaa authentication login default group enable local ISE-Servers

Answers
C.

aaa authorization exec default group ISE-Servers local enable

C.

aaa authorization exec default group ISE-Servers local enable

Answers
D.

aaa authentication login error-enable aaa authentication login default group enable local ISE-Servers

D.

aaa authentication login error-enable aaa authentication login default group enable local ISE-Servers

Answers
Suggested answer: A

A large campus network has deployed two wireless LAN controllers to manage the wireless network.

WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

A.

WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.

Answers
B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

B.

WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1

Answers
C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

C.

WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.

Answers
D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

D.

WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.

Answers
Suggested answer: B

Reter to the exhibit.

Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?

A.

Configure 172.16.20.0 as a stub network.

A.

Configure 172.16.20.0 as a stub network.

Answers
B.

Apply a policy to filter OSPF packets on R2.

B.

Apply a policy to filter OSPF packets on R2.

Answers
C.

Configure a passive Interface on R2 toward 172.16.20.0.

C.

Configure a passive Interface on R2 toward 172.16.20.0.

Answers
D.

Configure graceful restart on the 172.16.20.0 interface.

D.

Configure graceful restart on the 172.16.20.0 interface.

Answers
Suggested answer: C

What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?

A.

EIRP

A.

EIRP

Answers
B.

mW

B.

mW

Answers
C.

dBm

C.

dBm

Answers
D.

dBi

D.

dBi

Answers
Suggested answer: A

Reter to the exhibit.

Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

Reter to the exhibit.

Refer to the exhibit. An engineer has configured an IP SLA for UDP echo's. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?

A.

ip sla schedule 100 start-time now life forever

A.

ip sla schedule 100 start-time now life forever

Answers
B.

ip sla schedule 30 start-time now life forever

B.

ip sla schedule 30 start-time now life forever

Answers
C.

ip sla schedule 100 start-time now life 30

C.

ip sla schedule 100 start-time now life 30

Answers
D.

ip sla schedule 100 life forever

D.

ip sla schedule 100 life forever

Answers
Suggested answer: A
Total 983 questions
Go to page: of 99