Cisco 350-401 Practice Test - Questions Answers, Page 45
List of questions
Related questions
Which method displays text directly into the active console with a synchronous EEM applet policy?
event manager applet boom event syslog pattern 'UP' action 1.0 gets 'logging directly to console'
event manager applet boom event syslog pattern 'UP' action 1.0 syslog priority direct msg 'log directly to console'
event manager applet boom event syslog pattern 'UP' action 1.0 puts 'logging directly to console'
event manager applet boom event syslog pattern 'UP' action 1.0 string 'logging directly to console'
What is one main REST security design principle?
separation of privilege
password hashing
confidential algorithms
OAuth
How does NETCONF YANG represent data structures?
as strict data structures denned by RFC 6020
in an XML tree format
in an HTML format
as modules within a tree
What is the recommended minimum SNR for data applications on wireless networks?
15
20
25
10
A system must validate access rights to all its resources and must not rely on a cached permission matrix. If the access level to a given resource is revoked but is not reflected in the permission matrix, the security is violates Which term refers to this REST security design principle?
economy of mechanism
complete mediation
separation of privilege
least common mechanism
Reter to the exhibit.
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
The Gig0/0 interface of two routers is directly connected with a 1G Ethernet link. Which configuration must be applied to the interface of both routers to establish an OSPF adjacency without maintaining a DR/BDR relationship?
What is a characteristic of the overlay network in the Cisco SD-Access architecture?
It uses a traditional routed access design to provide performance and high availability to the network.
It consists of a group of physical routers and switches that are used to maintain the network.
It provides isolation among the virtual networks and independence from the physical network.
It provides multicast support to enable Layer 2 Hooding capability in the underlay network.
An administrator is configuring NETCONF using the following XML string. What must the administrator end the request with?
</rpc>]]>]]>
</rpc-reply>
</rpc>
<rpc message.id="9.0"><notificationoff/>
Which VXLAN component is used to encapsulate and decapsulate Ethernet frames?
VNI
GRE
VTEP
EVPN
Question