ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 71

Question list
Search
Search

Related questions











Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture? (Choose two )

A.

modular QoS

A.

modular QoS

Answers
B.

policy routing

B.

policy routing

Answers
C.

web authentication

C.

web authentication

Answers
D.

DHCP

D.

DHCP

Answers
E.

IEEE 802.1x

E.

IEEE 802.1x

Answers
Suggested answer: C, E

Which mobility role is assigned to a client in the client table of the new controller after a Layer 3 roam?

A.

anchor

A.

anchor

Answers
B.

foreign

B.

foreign

Answers
C.

mobility

C.

mobility

Answers
D.

transparent

D.

transparent

Answers
Suggested answer: D

Refer to the exhibit.

An LACP port channel is configured between Switch-1 and Switch-2, but It falls to come up. Which action will resolve the issue?

A.

Configure Switch-1 with channel-group mode active

A.

Configure Switch-1 with channel-group mode active

Answers
B.

Configure Switch-2 with channel-group mode desirable.

B.

Configure Switch-2 with channel-group mode desirable.

Answers
C.

Configure Switch-1 with channel-group mode on.

C.

Configure Switch-1 with channel-group mode on.

Answers
D.

Configure SwKch-2 with channel-group mode auto

D.

Configure SwKch-2 with channel-group mode auto

Answers
Suggested answer: A

What is one being of implementing a data modetag language?

A.

accuracy of the operations performed

A.

accuracy of the operations performed

Answers
B.

uses XML style of data formatting

B.

uses XML style of data formatting

Answers
C.

machine-oriented logic and language-facilitated processing.

C.

machine-oriented logic and language-facilitated processing.

Answers
D.

conceptual representation to simplify interpretation.

D.

conceptual representation to simplify interpretation.

Answers
Suggested answer: A

What is a benefit of Cisco TrustSec in a multilayered LAN network design?

A.

Policy or ACLS are nor required.

A.

Policy or ACLS are nor required.

Answers
B.

There is no requirements to run IEEE 802.1X when TrustSec is enabled on a switch port.

B.

There is no requirements to run IEEE 802.1X when TrustSec is enabled on a switch port.

Answers
C.

Applications flows between hosts on the LAN to remote destinations can be encrypted.

C.

Applications flows between hosts on the LAN to remote destinations can be encrypted.

Answers
D.

Policy can be applied on a hop-by-hop basis.

D.

Policy can be applied on a hop-by-hop basis.

Answers
Suggested answer: C

What is a client who is running 802.1x for authentication reffered to as?

A.

supplicant

A.

supplicant

Answers
B.

NAC device

B.

NAC device

Answers
C.

authenticator

C.

authenticator

Answers
D.

policy enforcement point

D.

policy enforcement point

Answers
Suggested answer: A

An engineer must configure GigabitEthernet 0/0 for VRRP group 65. The rouler must assume the primary rote when it has the highest priority in the group. Which command set must be applied?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: D


Refer to the exhibit.

Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF?

(Choose two)

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
E.


E.


Answers
Suggested answer: C, D

Which configuration filters out DOT1X messages in the format shown below from being sent toward Syslog server 10.15.20.33?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A

SIMULATION

A.

See the Solution below

A.

See the Solution below

Answers
Suggested answer: A

Explanation:

R1

Router ospf 1

Int loop0

Ip ospf 1 area 0

Int et0/0

Ip ospf 1 area 0

Ip ospf network point-to-point

Copy run start

R2

Router ospf 1

Int loop0

Ip ospf 1 area 0

Int et0/0

Ip ospf 1 area 0

Ip ospf network point-to-point

Copy run start

Verification:-

Total 983 questions
Go to page: of 99