ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Refer to the exhibit.

What are two effects of this configuration? (Choose two.)

A.

R1 becomes the active router.

A.

R1 becomes the active router.

Answers
B.

R1 becomes the standby router.

B.

R1 becomes the standby router.

Answers
C.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

C.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

Answers
D.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

D.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

Answers
E.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

E.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

Answers
Suggested answer: A, D

Refer to the exhibit.

What does the snippet of code achieve?

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

A.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

Answers
B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

B.

It opens a tunnel and encapsulates the login information, if the host key is correct.

Answers
C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

C.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

Answers
D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

D.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Answers
Suggested answer: C

Explanation:

ncclient is a Python library that facilitates client-side scripting and application development around the NETCONF protocol.

The above Python snippet uses the ncclient to connect and establish a NETCONF session to a Nexus device (which is also a NETCONF server).


What is one fact about Cisco SD-Access wireless network deployments?

A.

The access point is part of the fabric underlay

A.

The access point is part of the fabric underlay

Answers
B.

The WLC is part of the fabric underlay

B.

The WLC is part of the fabric underlay

Answers
C.

The access point is part the fabric overlay

C.

The access point is part the fabric overlay

Answers
D.

The wireless client is part of the fabric overlay

D.

The wireless client is part of the fabric overlay

Answers
Suggested answer: C

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?

A.

The tunnel will be established and work as expected

A.

The tunnel will be established and work as expected

Answers
B.

The tunnel destination will be known via the tunnel interface

B.

The tunnel destination will be known via the tunnel interface

Answers
C.

The tunnel keepalive is configured incorrectly because they must match on both sites

C.

The tunnel keepalive is configured incorrectly because they must match on both sites

Answers
D.

The default MTU of the tunnel interface is 1500 byte.

D.

The default MTU of the tunnel interface is 1500 byte.

Answers
Suggested answer: B


Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?

A.

MAB

A.

MAB

Answers
B.

802.1X

B.

802.1X

Answers
C.

WebAuth

C.

WebAuth

Answers
D.

port security sticky MAC

D.

port security sticky MAC

Answers
Suggested answer: B


Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?

A.

Set the weight attribute to 65.535 on BR1 toward PE1.

A.

Set the weight attribute to 65.535 on BR1 toward PE1.

Answers
B.

Set the local preference to 150 on PE1 toward BR1 outbound

B.

Set the local preference to 150 on PE1 toward BR1 outbound

Answers
C.

Set the MED to 1 on PE2 toward BR2 outbound.

C.

Set the MED to 1 on PE2 toward BR2 outbound.

Answers
D.

Set the origin to igp on BR2 toward PE2 inbound.

D.

Set the origin to igp on BR2 toward PE2 inbound.

Answers
Suggested answer: C

Explanation:

MED Attribute:

+ Optional nontransitive attribute (nontransitive means that we can only advertise MED to routers that are one AS away) + Sent through ASes to external BGP neighbors + Lower value is preferred (it can be considered the external metric of a route) + Default value is 0

Which two methods are used to reduce the AP coverage area? (Choose two)

A.

Reduce channel width from 40 MHz to 20 MHz

A.

Reduce channel width from 40 MHz to 20 MHz

Answers
B.

Disable 2.4 GHz and use only 5 GHz.

B.

Disable 2.4 GHz and use only 5 GHz.

Answers
C.

Reduce AP transmit power.

C.

Reduce AP transmit power.

Answers
D.

Increase minimum mandatory data rate

D.

Increase minimum mandatory data rate

Answers
E.

Enable Fastlane

E.

Enable Fastlane

Answers
Suggested answer: C, D

Refer to the exhibit.

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

A.

line vty 0 15 absolute-timeout 600

A.

line vty 0 15 absolute-timeout 600

Answers
B.

line vty 0 15 exec-timeout

B.

line vty 0 15 exec-timeout

Answers
C.

line vty 01 5 exec-timeout 10 0

C.

line vty 01 5 exec-timeout 10 0

Answers
D.

line vty 0 4 exec-timeout 600

D.

line vty 0 4 exec-timeout 600

Answers
Suggested answer: C

Which two threats does AMP4E have the ability to block? (Choose two.)

A.

DDoS

A.

DDoS

Answers
B.

ransomware

B.

ransomware

Answers
C.

Microsoft Word macro attack

C.

Microsoft Word macro attack

Answers
D.

SQL injection

D.

SQL injection

Answers
E.

email phishing

E.

email phishing

Answers
Suggested answer: B, C

Explanation:

https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008- 00-cisco-amp-for-endpoints-wp-v2a.pdf


What does the cisco REST response indicate?

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

A.

Cisco DNA Center has the Incorrect credentials for cat3850-1

Answers
B.

Cisco DNA Center is unable to communicate with cat9000-1

B.

Cisco DNA Center is unable to communicate with cat9000-1

Answers
C.

Cisco DNA Center has the incorrect credentials for cat9000-1

C.

Cisco DNA Center has the incorrect credentials for cat9000-1

Answers
D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

D.

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Answers
Suggested answer: C
Total 983 questions
Go to page: of 99