ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 70

Question list
Search
Search

Related questions











Refer to the exhibit.

Refer to the exhibit. An engineer constructs an EEM applet to prevent anyone from entering configuration mode on a switch. Which snippet is required to complete the EEM applet?

A.

sync yes skip yes

A.

sync yes skip yes

Answers
B.

sync no skip yes

B.

sync no skip yes

Answers
C.

sync no skip no

C.

sync no skip no

Answers
D.

sync yes skip no

D.

sync yes skip no

Answers
Suggested answer: B

Which security measure mitigates a man-in-the-middle attack of a REST API?

A.

SSL certificates

A.

SSL certificates

Answers
B.

biometric authentication

B.

biometric authentication

Answers
C.

password hash

C.

password hash

Answers
D.

non repudiotion feature

D.

non repudiotion feature

Answers
Suggested answer: A

What is the result of applying this access control list?

A.

TCP traffic with the URG bit set is allowed

A.

TCP traffic with the URG bit set is allowed

Answers
B.

TCP traffic with the SYN bit set is allowed

B.

TCP traffic with the SYN bit set is allowed

Answers
C.

TCP traffic with the ACK bit set is allowed

C.

TCP traffic with the ACK bit set is allowed

Answers
D.

TCP traffic with the DF bit set is allowed

D.

TCP traffic with the DF bit set is allowed

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. A network administrator must configure router B to allow traffic only from network 10.1002.0 to networks outside of router 0. Which configuration must be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D

A firewall address of 192 166.1.101 can be pinged from a router but, when running a traceroute to It, this output is received

What is the cause of this issue?

A.

The firewall blocks ICMP traceroute traffic.

A.

The firewall blocks ICMP traceroute traffic.

Answers
B.

The firewall rule that allows ICMP traffic does not function correctly

B.

The firewall rule that allows ICMP traffic does not function correctly

Answers
C.

The firewall blocks ICMP traffic.

C.

The firewall blocks ICMP traffic.

Answers
D.

The firewall blocks UDP traffic

D.

The firewall blocks UDP traffic

Answers
Suggested answer: D

How is traffic classified when using Cisco TrustSec technology?

A.

with the VLAN

A.

with the VLAN

Answers
B.

with the MAC address

B.

with the MAC address

Answers
C.

with the IP address

C.

with the IP address

Answers
D.

with the security group tag

D.

with the security group tag

Answers
Suggested answer: D

Refer to the exhibit.

Reler to the exhibit The EtherChannel between SW1 and SW2 is not operational. Which a coon will resolve the issue?

A.

Configure channel-group 1 mode active on GVO and G1 1 of SW2.

A.

Configure channel-group 1 mode active on GVO and G1 1 of SW2.

Answers
B.

Configure twitchport trunk encapsulation dot1q on SW1 and SW2.

B.

Configure twitchport trunk encapsulation dot1q on SW1 and SW2.

Answers
C.

Configure channel-group 1 mode active on Gl'O and GM of SW1 .

C.

Configure channel-group 1 mode active on Gl'O and GM of SW1 .

Answers
D.

Configure switchport mode dynamic desirable on SW1 and SW2

D.

Configure switchport mode dynamic desirable on SW1 and SW2

Answers
Suggested answer: C

What does the destination MAC on the outer MAC header identify in a VXLAN packet?

A.

thee emote spine

A.

thee emote spine

Answers
B.

the next hop

B.

the next hop

Answers
C.

the leaf switch

C.

the leaf switch

Answers
D.

the remote switch

D.

the remote switch

Answers
Suggested answer: B

Which JSON script is properly formatted?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: B

What is a characteristic of a traditional WAN?

A.

low complexity and high overall solution scale

A.

low complexity and high overall solution scale

Answers
B.

centralized reachability, security, and application policies

B.

centralized reachability, security, and application policies

Answers
C.

operates over DTLS and TLS authenticated and secured tunnels

C.

operates over DTLS and TLS authenticated and secured tunnels

Answers
D.

united data plane and control plane

D.

united data plane and control plane

Answers
Suggested answer: D
Total 983 questions
Go to page: of 99