Cisco 350-401 Practice Test - Questions Answers, Page 66
List of questions
Related questions
Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?
Ingress Tunnel Router
Map Resolver
Proxy ETR
Router Locator
Refer to the exhibit.
Which action results from executing the Python script?
display the output of a command that is entered on that device in a single line
SSH to the IP address that is manually entered on that device
display the output of a command that is entered on that device
display the unformatted output of a command that is entered on that device
Refer to the exhibit.
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?
SW1(config)#intgi1/1
SW1(config)#switchport trunk allowed vlan 1-9,11-4094
SW2(config)#intgi1/2
SW2(config)#switchport trunk allowed vlan 10
SW2(config)#int gi1/2
SW2(config)#switchport trunk allowed vlan 1-9,11-4094
SWl(config)#intgi1/1
SW1(config)#switchport trunk allowed vlan 10
In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?
RSSI
dBI
SNR
EIRP
When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?
CONTROLLER-CAPWAP-CISCO
CISCO-CONTROLLER-CAPWAP
CAPWAP-CISCO-CONTROLLER
CISCO-CAPWAP-CONTROLLER
An engineer must implement a configuration to allow a network administrator to connect to the console port of a router and authenticate over the network. Which command set should the engineer use?
aaa new-model aaa authentication login default enable
aaa new-model aaa authentication login console local
aaa new-model aaa authentication login console group radius
aaa new-model aaa authentication enable default
Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)
DVPN
NAT
stateful packet inspection
application-level inspection
integrated intrusion prevention
How do cloud deployments compare to on-premises deployments?
Cloud deployments provide a better user experience across world regions, whereas on-premises deployments depend upon region-specific conditions
Cloud deployments are inherently unsecure. whereas a secure architecture is mandatory for onpremises deployments.
Cloud deployments mandate a secure architecture, whereas on-premises deployments are inherently unsecure.
Cloud deployments must include automation infrastructure, whereas on-premises deployments often lack the ability for automation.
Refer to the exhibit.
Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)
spanning-tree mst 1 priority 1
spanning-tree mstp vlan 10.20 root primary
spanning-tree mil 1 root primary
spanning-tree mst 1 priority 4096
spanning-tree mst vlan 10.20 priority root
Which collection contains the resources to obtain a list of fabric nodes through the vManage API?
device management
administration
device inventory
monitoring
Question