ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 68

Question list
Search
Search

Related questions











Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?

A.

map server

A.

map server

Answers
B.

map resolver

B.

map resolver

Answers
C.

ingress tunnel router

C.

ingress tunnel router

Answers
D.

egress tunnel router

D.

egress tunnel router

Answers
Suggested answer: C

Refer to the exhibit.

What is achieved by the XML code?

A.

It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list.

A.

It reads the access list sequence numbers from the output of the show ip access-list extended flp command into a dictionary list.

Answers
B.

It displays the output of the show ip access-list extended flp command on the terminal screen

B.

It displays the output of the show ip access-list extended flp command on the terminal screen

Answers
C.

It displays the access list sequence numbers from the output of the show Ip access-list extended flp command on the terminal screen

C.

It displays the access list sequence numbers from the output of the show Ip access-list extended flp command on the terminal screen

Answers
D.

It reads the output of the show ip access-list extended flp command into a dictionary list.

D.

It reads the output of the show ip access-list extended flp command into a dictionary list.

Answers
Suggested answer: A


Which solution supports end to end line-rate encryption between two sites?

A.

IPsec

A.

IPsec

Answers
B.

TrustSec

B.

TrustSec

Answers
C.

MACseC

C.

MACseC

Answers
D.

GRE

D.

GRE

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and block all other traffic. Which configuration must be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

Refer to the exhibit.

Refer to the exhibit Remote users cannot access the Internet but can upload files to the storage server Which configuration must be applied to allow Internet access?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish What is the reason for the failure?

A.

BGP peer 10 255 255 3 is not configured for peenng wth R1

A.

BGP peer 10 255 255 3 is not configured for peenng wth R1

Answers
B.

Mandatory BOP parameters between R1 and 10 255 255 3 are mismatched

B.

Mandatory BOP parameters between R1 and 10 255 255 3 are mismatched

Answers
C.

A firewall is blocking access to TCP port 179 on the BGP peer 10 255 255.3

C.

A firewall is blocking access to TCP port 179 on the BGP peer 10 255 255.3

Answers
D.

Both BGP pern are configured for passive TCP transport

D.

Both BGP pern are configured for passive TCP transport

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit Which command must be applied to complete the configuration and enable RESTCONF?

A.

ip http secure-server

A.

ip http secure-server

Answers
B.

ip http server

B.

ip http server

Answers
C.

ip http secure-port 443

C.

ip http secure-port 443

Answers
D.

ip http client username restconf

D.

ip http client username restconf

Answers
Suggested answer: A

A customer has 20 stores located throughout a city. Each store has a single Cisco access point managed by a central WLC. The customer wants to gather analysis for users in each store. Which technique supports these requirements?

A.

angle of arrival

A.

angle of arrival

Answers
B.

hyperlocation

B.

hyperlocation

Answers
C.

trilateration

C.

trilateration

Answers
D.

presence

D.

presence

Answers
Suggested answer: B

Which authorization framework gives third-party applications limited access to HTTP services?

A.

iPsec

A.

iPsec

Answers
B.

Basic Auth

B.

Basic Auth

Answers
C.

GRE

C.

GRE

Answers
D.

OAuth 2.0

D.

OAuth 2.0

Answers
Suggested answer: D

In lhe Cisco DNA Center Image Repository, what is a golden image?

A.

The latest software image that is available for a specific device type

A.

The latest software image that is available for a specific device type

Answers
B.

The Cisco recommended software image for a specific device type.

B.

The Cisco recommended software image for a specific device type.

Answers
C.

A software image that is compatible with multiple device types.

C.

A software image that is compatible with multiple device types.

Answers
D.

A software image that meets the compliance requirements of the organization.

D.

A software image that meets the compliance requirements of the organization.

Answers
Suggested answer: B
Total 983 questions
Go to page: of 99