Cisco 350-401 Practice Test - Questions Answers, Page 44
List of questions
Related questions
Which protocol is responsible for data plane forwarding in a Cisco SD-Access deployment?
VXLAN
IS-IS
OSPF
LISP
Which function does a fabric AP perform in a cisco SD-access deployment?
It updates wireless clients' locations in the fabric
It connects wireless clients to the fabric.
It manages wireless clients' membership information in the fabric
It configures security policies down to wireless clients in the fabric.
Reter to the exhibit.
Refer to the exhibit. Which python code parses the response and prints "18:32:21.474 UTC sun Mar 10 2019?
print(response['resut'][0||'simple_time']}
print(response[result']['body']['simple_time']}
print(response['body']['simple_time']}
print(response[jresult']['body']['simple_time']}
what is a benefit of using a Type 2 hypervisor instead of a Type 1 hypervisor?
better application performance
Improved security because the underlying OS is eliminated
Improved density and scalability
ability to operate on hardware that is running other OSs
Refer to the exhibit.
A network engineer must configure the router to use the ISE-Servers group for authentication. If both ISE servers are unavailable, the local username database must be used. If no usernames are defined in the configuration, then the enable password must be the last resort to log in. Which configuration must be applied to achieve this result?
aaa authentication login default group ISE-Servers local enable
aaa authentication login default group enable local ISE-Servers
aaa authorization exec default group ISE-Servers local enable
aaa authentication login error-enable aaa authentication login default group enable local ISE-Servers
A large campus network has deployed two wireless LAN controllers to manage the wireless network.
WLC1 and WLC2 have been configured as mobility peers. A client device roams from AP1 on WLC1 to AP2 on WLC2, but the controller's client interfaces are on different VLANs. How do the wireless LAN controllers handle the inter-subnet roaming?
WLC1 marks me diem with an anchor entry In Its own database. The database entry is copied to the new controller and marked with a foreign entry on VVLC2.
WLC2 marks the client with an anchor entry In Its own database. The database entry Is copied to the new controller and marked with a foreign entry on WLC1
WLCl marks the client with a foreign entry in its own database. The database entry is copied to the new controller and marked with an anchor entry on WLC2.
WLC2 marks the client with a foreign entry In its own database. The database entry Is copied to the new controller and marked with an anchor entry on WLC1.
Reter to the exhibit.
Refer to the exhibit. An attacker can advertise OSPF fake routes from 172.16.20.0 network to the OSPF domain and black hole traffic. Which action must be taken to avoid this attack and still be able to advertise this subnet into OSPF?
Configure 172.16.20.0 as a stub network.
Apply a policy to filter OSPF packets on R2.
Configure a passive Interface on R2 toward 172.16.20.0.
Configure graceful restart on the 172.16.20.0 interface.
What is the calculation that is used to measure the radiated power of a signal after it has gone through the radio, antenna cable, and antenna?
EIRP
mW
dBm
dBi
Reter to the exhibit.
Refer to the exhibit. An engineer tries to log in to router R1. Which configuration enables a successful login?
Reter to the exhibit.
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo's. Which command is needed to start the IP SLA to test every 30 seconds and continue until stopped?
ip sla schedule 100 start-time now life forever
ip sla schedule 30 start-time now life forever
ip sla schedule 100 start-time now life 30
ip sla schedule 100 life forever
Question