Cisco 350-401 Practice Test - Questions Answers, Page 70
List of questions
Related questions
Refer to the exhibit.
Refer to the exhibit. An engineer constructs an EEM applet to prevent anyone from entering configuration mode on a switch. Which snippet is required to complete the EEM applet?
sync yes skip yes
sync no skip yes
sync no skip no
sync yes skip no
Which security measure mitigates a man-in-the-middle attack of a REST API?
SSL certificates
biometric authentication
password hash
non repudiotion feature
What is the result of applying this access control list?
TCP traffic with the URG bit set is allowed
TCP traffic with the SYN bit set is allowed
TCP traffic with the ACK bit set is allowed
TCP traffic with the DF bit set is allowed
Refer to the exhibit.
Refer to the exhibit. A network administrator must configure router B to allow traffic only from network 10.1002.0 to networks outside of router 0. Which configuration must be applied?
A firewall address of 192 166.1.101 can be pinged from a router but, when running a traceroute to It, this output is received
What is the cause of this issue?
The firewall blocks ICMP traceroute traffic.
The firewall rule that allows ICMP traffic does not function correctly
The firewall blocks ICMP traffic.
The firewall blocks UDP traffic
How is traffic classified when using Cisco TrustSec technology?
with the VLAN
with the MAC address
with the IP address
with the security group tag
Refer to the exhibit.
Reler to the exhibit The EtherChannel between SW1 and SW2 is not operational. Which a coon will resolve the issue?
Configure channel-group 1 mode active on GVO and G1 1 of SW2.
Configure twitchport trunk encapsulation dot1q on SW1 and SW2.
Configure channel-group 1 mode active on Gl'O and GM of SW1 .
Configure switchport mode dynamic desirable on SW1 and SW2
What does the destination MAC on the outer MAC header identify in a VXLAN packet?
thee emote spine
the next hop
the leaf switch
the remote switch
What is a characteristic of a traditional WAN?
low complexity and high overall solution scale
centralized reachability, security, and application policies
operates over DTLS and TLS authenticated and secured tunnels
united data plane and control plane
Question