Cisco 350-401 Practice Test - Questions Answers, Page 57
List of questions
Related questions
Refer to the exhibit.
A company has an internal wireless network with a hidden SSID and RADIUS-based client authentication for increased security. An employee attempts to manually add the company network to a laptop, but the laptop does not attempt to connect to the network. The regulatory domains of the access points and the laptop are identical. Which action resolves this issue?
Ensure that the "Connect even if this network is not broadcasting" option is selected.
Limit the enabled wireless channels on the laptop to the maximum channel range that is supported by the access points.
Change the security type to WPA2-Personal AES.
Use the empty string as the hidden SSID network name.
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which configuration must be applied?
Option A
Option B
Option C
Option D
When does a Cisco StackWise primary switch lose its role?
when a stack member fails
when the stack primary is reset
when a switch with a higher priority is added to the stack
when the priority value of a stack member is changed to a higher value
Refer to the exhibit. What are two results of the NAT configuration? (Choose two.)
Packets with a destination of 200.1.1.1 are translated to 10.1.1.1 or .2. respectively.
A packet that is sent to 200.1.1.1 from 10.1.1.1 is translated to 209.165.201.1 on R1.
R1 looks at the destination IP address of packets entering S0/0 and destined for inside hosts.
R1 processes packets entering E0/0 and S0/0 by examining the source IP address.
R1 is performing NAT for inside addresses and outside address.
Refer to the exhibit.
Clients report that they cannot connect to this SSID using the provided PSK.
Which action will resolve this issue?
Apply the correct interface to this WLAN.
Apply the changes this SSID.
Select the PSK under authentication key management.
Define the correct Radio Policy.
Refer to the exhibit.
Refer to the exhibit. Which command set completes the ERSPAN session configuration?
Option A
Option B
Option C
Option D
DRAG DROP
Drag and drop the tools from the left onto the agent types on the right.
DRAG DROP
Drag and drop the characteristics from the left onto the switching architectures on the right.
How do the RIB and the FIB differ?
FIB contains routes learned through a dynamic routing protocol, and the RIB contains routes that are static or directly connected.
RIB contains the interface for a destination, and the FIB contains the next hop information.
FIB is derived from the control plane, and the RIB is derived from the data plane.
RIB is derived from the control plane, and the FIB is derived from the RIB.
In a Cisco StackWise Virtual environment, which planes are virtually combined in the common logical switch?
control, and forwarding
management and data
control and management
control and data
Question