ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 65

Question list
Search
Search

Related questions











Which DNS lookup does an AP perform when attempting CAPWAP discovery?

A.

CAPWAP-CONTROLLER.Iocal

A.

CAPWAP-CONTROLLER.Iocal

Answers
B.

CISCO-CAPWAP-CONTROLLER.Iocal

B.

CISCO-CAPWAP-CONTROLLER.Iocal

Answers
C.

CISCO-DNA-CONTROLLER.Iocal

C.

CISCO-DNA-CONTROLLER.Iocal

Answers
D.

CISCO-CONTROLLER.Iocal

D.

CISCO-CONTROLLER.Iocal

Answers
Suggested answer: B

Refer to the exhibit.

Why does OSPF fail to establish an adjacency between R1 and R2?

A.

authentication mismatch

A.

authentication mismatch

Answers
B.

interface MTU mismatch

B.

interface MTU mismatch

Answers
C.

area mismatch

C.

area mismatch

Answers
D.

timers mismatch

D.

timers mismatch

Answers
Suggested answer: B

Which two features are available only in next-generation firewalls? (Choose two.)

A.

virtual private network

A.

virtual private network

Answers
B.

deep packet inspection

B.

deep packet inspection

Answers
C.

stateful inspection

C.

stateful inspection

Answers
D.

application awareness

D.

application awareness

Answers
E.

packet filtering

E.

packet filtering

Answers
Suggested answer: C, D

What is a benefit of using segmentation with TrustSec?

A.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

A.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

Answers
B.

Firewall rules are streamlined by using business-level profiles.

B.

Firewall rules are streamlined by using business-level profiles.

Answers
C.

Integrity checks prevent data from being modified in transit.

C.

Integrity checks prevent data from being modified in transit.

Answers
D.

Security group tags enable network segmentation.

D.

Security group tags enable network segmentation.

Answers
Suggested answer: B

Refer to the exhibit.

Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?

A.

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

A.

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

Answers
B.

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

B.

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

Answers
C.

Router(config)# aaa fallback local

C.

Router(config)# aaa fallback local

Answers
D.

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

D.

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

Answers
Suggested answer: B

A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EolP tunnel remains in an UP state in the event of failover on the SSO cluster?

A.

Configure back-to-back connectivity on the RP ports.

A.

Configure back-to-back connectivity on the RP ports.

Answers
B.

Enable default gateway reachability check.

B.

Enable default gateway reachability check.

Answers
C.

Use the same mobility domain on all WLCs.

C.

Use the same mobility domain on all WLCs.

Answers
D.

Use the mobility MAC when the mobility peer is configured.

D.

Use the mobility MAC when the mobility peer is configured.

Answers
Suggested answer: B

Refer to the exhibit.

Extended access-list 100 is configured on interface GigabitEthernet 0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?

A.

R1(config)#no access-list 100 seq 10

R1(config)#access-list 100 seq 40 deny ip any any

A.

R1(config)#no access-list 100 seq 10

R1(config)#access-list 100 seq 40 deny ip any any

Answers
B.

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#no 10

B.

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#no 10

Answers
C.

R1(config)#no access-list 100 deny ip any any

C.

R1(config)#no access-list 100 deny ip any any

Answers
D.

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#5 permit to any any

D.

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#5 permit to any any

Answers
Suggested answer: A

Refer to the exhibit.

What is achieved by this Python script?

A.

It counts JSON data from a website.

A.

It counts JSON data from a website.

Answers
B.

It loads JSON data into an HTTP request.

B.

It loads JSON data into an HTTP request.

Answers
C.

It reads JSON data into a formatted list.

C.

It reads JSON data into a formatted list.

Answers
D.

It converts JSON data to an HTML document.

D.

It converts JSON data to an HTML document.

Answers
Suggested answer: B

Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?

A.

NSF

A.

NSF

Answers
B.

graceful restart

B.

graceful restart

Answers
C.

SSO

C.

SSO

Answers
D.

FHRP

D.

FHRP

Answers
Suggested answer: C

Which action limits the total amount of memory and CPU that is used by a collection of VMs?

A.

Place the collection of VMs in a resource pool.

A.

Place the collection of VMs in a resource pool.

Answers
B.

Place the collection of VMs in a vApp.

B.

Place the collection of VMs in a vApp.

Answers
C.

Limit the amount of memory and CPU that is available to the cluster.

C.

Limit the amount of memory and CPU that is available to the cluster.

Answers
D.

Limit the amount of memory and CPU that is available to the individual VMs.

D.

Limit the amount of memory and CPU that is available to the individual VMs.

Answers
Suggested answer: A
Total 983 questions
Go to page: of 99