ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 45

Question list
Search
Search

Related questions











Which method displays text directly into the active console with a synchronous EEM applet policy?

A.

event manager applet boom event syslog pattern 'UP' action 1.0 gets 'logging directly to console'

A.

event manager applet boom event syslog pattern 'UP' action 1.0 gets 'logging directly to console'

Answers
B.

event manager applet boom event syslog pattern 'UP' action 1.0 syslog priority direct msg 'log directly to console'

B.

event manager applet boom event syslog pattern 'UP' action 1.0 syslog priority direct msg 'log directly to console'

Answers
C.

event manager applet boom event syslog pattern 'UP' action 1.0 puts 'logging directly to console'

C.

event manager applet boom event syslog pattern 'UP' action 1.0 puts 'logging directly to console'

Answers
D.

event manager applet boom event syslog pattern 'UP' action 1.0 string 'logging directly to console'

D.

event manager applet boom event syslog pattern 'UP' action 1.0 string 'logging directly to console'

Answers
Suggested answer: B

What is one main REST security design principle?

A.

separation of privilege

A.

separation of privilege

Answers
B.

password hashing

B.

password hashing

Answers
C.

confidential algorithms

C.

confidential algorithms

Answers
D.

OAuth

D.

OAuth

Answers
Suggested answer: A

Explanation:

Separation of Privilege: Granting permissions to an entity should not be purely based on a single condition, a combination of conditions based on the type of resource is a better idea.

https://restfulapi.net/securityessentials/#:~:text=REST%20Security%20Design%20Principles&text=Least%20Privilege%3A%20An%20entity%20should,when%20no%20longer%20in%20use.

How does NETCONF YANG represent data structures?

A.

as strict data structures denned by RFC 6020

A.

as strict data structures denned by RFC 6020

Answers
B.

in an XML tree format

B.

in an XML tree format

Answers
C.

in an HTML format

C.

in an HTML format

Answers
D.

as modules within a tree

D.

as modules within a tree

Answers
Suggested answer: B

What is the recommended minimum SNR for data applications on wireless networks?

A.

15

A.

15

Answers
B.

20

B.

20

Answers
C.

25

C.

25

Answers
D.

10

D.

10

Answers
Suggested answer: B

Explanation:

Generally, a signal with an SNR value of 20 dB or more is recommended for data networks where as an SNR value of 25 dB or more is recommended for networks that use voice applications

https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Signal-to-Noise_Ratio_(SNR)_and_Wireless_Signal_Strength#:~:text=Generally%2C%20a%20signal%20with%20an,networks%20that%20use%20voice%20applications.

A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?

A.

economy of mechanism

A.

economy of mechanism

Answers
B.

complete mediation

B.

complete mediation

Answers
C.

separation of privilege

C.

separation of privilege

Answers
D.

least common mechanism

D.

least common mechanism

Answers
Suggested answer: B

Explanation:

A system should validate access rights to all its resources to ensure that they are allowed and should not rely on the cached permission matrix. If the access level to a given resource is being revoked, but that is not being reflected in the permission matrix, it would be violating security.

https://medium.com/strike-sh/rest-security-design-principles-434bd6ee57ea

Reter to the exhibit.

Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
E.


E.


Answers
Suggested answer: A, C

The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

What is a characteristic of the overlay network in the Cisco SD-Access architecture?

A.

It uses a traditional routed access design to provide performance and high availability to the network.

A.

It uses a traditional routed access design to provide performance and high availability to the network.

Answers
B.

It consists of a group of physical routers and switches that are used to maintain the network.

B.

It consists of a group of physical routers and switches that are used to maintain the network.

Answers
C.

It provides isolation among the virtual networks and independence from the physical network.

C.

It provides isolation among the virtual networks and independence from the physical network.

Answers
D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

D.

It provides multicast support to enable Layer 2 Hooding capability in the underlay network.

Answers
Suggested answer: C

An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?

A.

</rpc>]]>]]>

A.

</rpc>]]>]]>

Answers
B.

</rpc-reply>

B.

</rpc-reply>

Answers
C.

</rpc>

C.

</rpc>

Answers
D.

<rpc message.id="9.0"><notificationoff/>

D.

<rpc message.id="9.0"><notificationoff/>

Answers
Suggested answer: A

Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?

A.

VNI

A.

VNI

Answers
B.

GRE

B.

GRE

Answers
C.

VTEP

C.

VTEP

Answers
D.

EVPN

D.

EVPN

Answers
Suggested answer: C
Total 983 questions
Go to page: of 99