ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 51 115350 10102024232942000000

What are two effects of this configuration? (Choose two.)

R1 becomes the active router.

R1 becomes the active router.

R1 becomes the standby router.

R1 becomes the standby router.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.

Suggested answer: A, D
asked 10/10/2024
Josiah Pardee
51 questions

Question 52

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 52 115351 10102024232942000000

What does the snippet of code achieve?

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

It creates a temporary connection to a Cisco Nexus device and retrieves a token to be used for API calls.

It opens a tunnel and encapsulates the login information, if the host key is correct.

It opens a tunnel and encapsulates the login information, if the host key is correct.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

It opens an ncclient connection to a Cisco Nexus device and maintains it for the duration of the context.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

It creates an SSH connection using the SSH key that is stored, and the password is ignored.

Suggested answer: C
Explanation:

ncclient is a Python library that facilitates client-side scripting and application development around the NETCONF protocol.

The above Python snippet uses the ncclient to connect and establish a NETCONF session to a Nexus device (which is also a NETCONF server).

asked 10/10/2024
Arvind Prasad S
50 questions

Question 53

Report Export Collapse

Cisco 350-401 image Question 53 115352 10102024232942000000


What is one fact about Cisco SD-Access wireless network deployments?

The access point is part of the fabric underlay

The access point is part of the fabric underlay

The WLC is part of the fabric underlay

The WLC is part of the fabric underlay

The access point is part the fabric overlay

The access point is part the fabric overlay

The wireless client is part of the fabric overlay

The wireless client is part of the fabric overlay

Suggested answer: C
asked 10/10/2024
Eric Zarghami
56 questions

Question 54

Report Export Collapse

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?

The tunnel will be established and work as expected

The tunnel will be established and work as expected

The tunnel destination will be known via the tunnel interface

The tunnel destination will be known via the tunnel interface

The tunnel keepalive is configured incorrectly because they must match on both sites

The tunnel keepalive is configured incorrectly because they must match on both sites

The default MTU of the tunnel interface is 1500 byte.

The default MTU of the tunnel interface is 1500 byte.

Suggested answer: B
asked 10/10/2024
Marc Aurele ALLOTCHENOU
41 questions

Question 55

Report Export Collapse

Cisco 350-401 image Question 55 115354 10102024232942000000


Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?

MAB

MAB

802.1X

802.1X

WebAuth

WebAuth

port security sticky MAC

port security sticky MAC

Suggested answer: B
asked 10/10/2024
Nicoleta Moglan
40 questions

Question 56

Report Export Collapse

Cisco 350-401 image Question 56 115355 10102024232942000000

Cisco 350-401 image Question 56 115355 10102024232942000000


Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?

Set the weight attribute to 65.535 on BR1 toward PE1.

Set the weight attribute to 65.535 on BR1 toward PE1.

Set the local preference to 150 on PE1 toward BR1 outbound

Set the local preference to 150 on PE1 toward BR1 outbound

Set the MED to 1 on PE2 toward BR2 outbound.

Set the MED to 1 on PE2 toward BR2 outbound.

Set the origin to igp on BR2 toward PE2 inbound.

Set the origin to igp on BR2 toward PE2 inbound.

Suggested answer: C
Explanation:

MED Attribute:

+ Optional nontransitive attribute (nontransitive means that we can only advertise MED to routers that are one AS away) + Sent through ASes to external BGP neighbors + Lower value is preferred (it can be considered the external metric of a route) + Default value is 0

asked 10/10/2024
Sheng-Feng Zhang
45 questions

Question 57

Report Export Collapse

Which two methods are used to reduce the AP coverage area? (Choose two)

Reduce channel width from 40 MHz to 20 MHz

Reduce channel width from 40 MHz to 20 MHz

Disable 2.4 GHz and use only 5 GHz.

Disable 2.4 GHz and use only 5 GHz.

Reduce AP transmit power.

Reduce AP transmit power.

Increase minimum mandatory data rate

Increase minimum mandatory data rate

Enable Fastlane

Enable Fastlane

Suggested answer: C, D
asked 10/10/2024
Ilias Akarkach
45 questions

Question 58

Report Export Collapse

Refer to the exhibit.

Cisco 350-401 image Question 58 115357 10102024232942000000

Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?

line vty 0 15 absolute-timeout 600

line vty 0 15 absolute-timeout 600

line vty 0 15 exec-timeout

line vty 0 15 exec-timeout

line vty 01 5 exec-timeout 10 0

line vty 01 5 exec-timeout 10 0

line vty 0 4 exec-timeout 600

line vty 0 4 exec-timeout 600

Suggested answer: C
asked 10/10/2024
Pachara Suwannasit
38 questions

Question 59

Report Export Collapse

Which two threats does AMP4E have the ability to block? (Choose two.)

DDoS

DDoS

ransomware

ransomware

Microsoft Word macro attack

Microsoft Word macro attack

SQL injection

SQL injection

email phishing

email phishing

Suggested answer: B, C
Explanation:

https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008- 00-cisco-amp-for-endpoints-wp-v2a.pdf

asked 10/10/2024
D Chauhan
43 questions

Question 60

Report Export Collapse

Cisco 350-401 image Question 60 115359 10102024232942000000


What does the cisco REST response indicate?

Cisco DNA Center has the Incorrect credentials for cat3850-1

Cisco DNA Center has the Incorrect credentials for cat3850-1

Cisco DNA Center is unable to communicate with cat9000-1

Cisco DNA Center is unable to communicate with cat9000-1

Cisco DNA Center has the incorrect credentials for cat9000-1

Cisco DNA Center has the incorrect credentials for cat9000-1

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Cisco DNA Center has the Incorrect credentials for RouterASR-1

Suggested answer: C
asked 10/10/2024
Edmond Chui
41 questions
Total 983 questions
Go to page: of 99

Related questions