Cisco 350-401 Practice Test - Questions Answers, Page 65
List of questions
Related questions
Which DNS lookup does an AP perform when attempting CAPWAP discovery?
CAPWAP-CONTROLLER.Iocal
CISCO-CAPWAP-CONTROLLER.Iocal
CISCO-DNA-CONTROLLER.Iocal
CISCO-CONTROLLER.Iocal
Refer to the exhibit.
Why does OSPF fail to establish an adjacency between R1 and R2?
authentication mismatch
interface MTU mismatch
area mismatch
timers mismatch
Which two features are available only in next-generation firewalls? (Choose two.)
virtual private network
deep packet inspection
stateful inspection
application awareness
packet filtering
What is a benefit of using segmentation with TrustSec?
Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.
Firewall rules are streamlined by using business-level profiles.
Integrity checks prevent data from being modified in transit.
Security group tags enable network segmentation.
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?
Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local
Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local
Router(config)# aaa fallback local
Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local
A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EolP tunnel remains in an UP state in the event of failover on the SSO cluster?
Configure back-to-back connectivity on the RP ports.
Enable default gateway reachability check.
Use the same mobility domain on all WLCs.
Use the mobility MAC when the mobility peer is configured.
Refer to the exhibit.
Extended access-list 100 is configured on interface GigabitEthernet 0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?
R1(config)#no access-list 100 seq 10
R1(config)#access-list 100 seq 40 deny ip any any
R1(config)#ip access-list extended 100
R1(config-ext-nacl)#no 10
R1(config)#no access-list 100 deny ip any any
R1(config)#ip access-list extended 100
R1(config-ext-nacl)#5 permit to any any
Refer to the exhibit.
What is achieved by this Python script?
It counts JSON data from a website.
It loads JSON data into an HTTP request.
It reads JSON data into a formatted list.
It converts JSON data to an HTML document.
Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?
NSF
graceful restart
SSO
FHRP
Which action limits the total amount of memory and CPU that is used by a collection of VMs?
Place the collection of VMs in a resource pool.
Place the collection of VMs in a vApp.
Limit the amount of memory and CPU that is available to the cluster.
Limit the amount of memory and CPU that is available to the individual VMs.
Question