ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 66

Question list
Search
Search

Related questions











Which LISP component decapsulates messages and forwards them to the map server responsible for the egress tunnel routers?

A.

Ingress Tunnel Router

A.

Ingress Tunnel Router

Answers
B.

Map Resolver

B.

Map Resolver

Answers
C.

Proxy ETR

C.

Proxy ETR

Answers
D.

Router Locator

D.

Router Locator

Answers
Suggested answer: B

Refer to the exhibit.

Which action results from executing the Python script?

A.

display the output of a command that is entered on that device in a single line

A.

display the output of a command that is entered on that device in a single line

Answers
B.

SSH to the IP address that is manually entered on that device

B.

SSH to the IP address that is manually entered on that device

Answers
C.

display the output of a command that is entered on that device

C.

display the output of a command that is entered on that device

Answers
D.

display the unformatted output of a command that is entered on that device

D.

display the unformatted output of a command that is entered on that device

Answers
Suggested answer: A

Refer to the exhibit.

Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the issue?

A.

SW1(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 1-9,11-4094

A.

SW1(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 1-9,11-4094

Answers
B.

SW2(config)#intgi1/2

SW2(config)#switchport trunk allowed vlan 10

B.

SW2(config)#intgi1/2

SW2(config)#switchport trunk allowed vlan 10

Answers
C.

SW2(config)#int gi1/2

SW2(config)#switchport trunk allowed vlan 1-9,11-4094

C.

SW2(config)#int gi1/2

SW2(config)#switchport trunk allowed vlan 1-9,11-4094

Answers
D.

SWl(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 10

D.

SWl(config)#intgi1/1

SW1(config)#switchport trunk allowed vlan 10

Answers
Suggested answer: C

In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

A.

RSSI

A.

RSSI

Answers
B.

dBI

B.

dBI

Answers
C.

SNR

C.

SNR

Answers
D.

EIRP

D.

EIRP

Answers
Suggested answer: B

When a DNS host record is configured for a new Cisco AireOS WLC, which hostname must be added to allow APs to successfully discover the WLC?

A.

CONTROLLER-CAPWAP-CISCO

A.

CONTROLLER-CAPWAP-CISCO

Answers
B.

CISCO-CONTROLLER-CAPWAP

B.

CISCO-CONTROLLER-CAPWAP

Answers
C.

CAPWAP-CISCO-CONTROLLER

C.

CAPWAP-CISCO-CONTROLLER

Answers
D.

CISCO-CAPWAP-CONTROLLER

D.

CISCO-CAPWAP-CONTROLLER

Answers
Suggested answer: D

An engineer must implement a configuration to allow a network administrator to connect to the console port of a router and authenticate over the network. Which command set should the engineer use?

A.

aaa new-model aaa authentication login default enable

A.

aaa new-model aaa authentication login default enable

Answers
B.

aaa new-model aaa authentication login console local

B.

aaa new-model aaa authentication login console local

Answers
C.

aaa new-model aaa authentication login console group radius

C.

aaa new-model aaa authentication login console group radius

Answers
D.

aaa new-model aaa authentication enable default

D.

aaa new-model aaa authentication enable default

Answers
Suggested answer: B

Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)

A.

DVPN

A.

DVPN

Answers
B.

NAT

B.

NAT

Answers
C.

stateful packet inspection

C.

stateful packet inspection

Answers
D.

application-level inspection

D.

application-level inspection

Answers
E.

integrated intrusion prevention

E.

integrated intrusion prevention

Answers
Suggested answer: D, E

How do cloud deployments compare to on-premises deployments?

A.

Cloud deployments provide a better user experience across world regions, whereas on-premises deployments depend upon region-specific conditions

A.

Cloud deployments provide a better user experience across world regions, whereas on-premises deployments depend upon region-specific conditions

Answers
B.

Cloud deployments are inherently unsecure. whereas a secure architecture is mandatory for onpremises deployments.

B.

Cloud deployments are inherently unsecure. whereas a secure architecture is mandatory for onpremises deployments.

Answers
C.

Cloud deployments mandate a secure architecture, whereas on-premises deployments are inherently unsecure.

C.

Cloud deployments mandate a secure architecture, whereas on-premises deployments are inherently unsecure.

Answers
D.

Cloud deployments must include automation infrastructure, whereas on-premises deployments often lack the ability for automation.

D.

Cloud deployments must include automation infrastructure, whereas on-premises deployments often lack the ability for automation.

Answers
Suggested answer: B


Refer to the exhibit.

Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)

A.

spanning-tree mst 1 priority 1

A.

spanning-tree mst 1 priority 1

Answers
B.

spanning-tree mstp vlan 10.20 root primary

B.

spanning-tree mstp vlan 10.20 root primary

Answers
C.

spanning-tree mil 1 root primary

C.

spanning-tree mil 1 root primary

Answers
D.

spanning-tree mst 1 priority 4096

D.

spanning-tree mst 1 priority 4096

Answers
E.

spanning-tree mst vlan 10.20 priority root

E.

spanning-tree mst vlan 10.20 priority root

Answers
Suggested answer: D, E

Which collection contains the resources to obtain a list of fabric nodes through the vManage API?

A.

device management

A.

device management

Answers
B.

administration

B.

administration

Answers
C.

device inventory

C.

device inventory

Answers
D.

monitoring

D.

monitoring

Answers
Suggested answer: C

Explanation:

The collection that contains the resources to obtain a list of fabric nodes through the vManage API is the device inventory collection. This collection can be accessed through the Cisco Encor Documents and provides resources such as the Fabric Visualization, Device List, and Fabric Node Inventory APIs.

These APIs can be used to obtain information about the fabric nodes, such as the device inventory, status, and version.

Total 983 questions
Go to page: of 99