ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 74

Question list
Search
Search

Related questions











Which hypervisor requires a host OS to run and is not allowed to directly access the hosts hardware and resources?

A.

native

A.

native

Answers
B.

bare metal

B.

bare metal

Answers
C.

type 1

C.

type 1

Answers
D.

type 2

D.

type 2

Answers
Suggested answer: D

In which way are EIGRP and OSPF similar?

A.

They both support unequal-cost load balancing

A.

They both support unequal-cost load balancing

Answers
B.

They both support MD5 authentication for routing updates.

B.

They both support MD5 authentication for routing updates.

Answers
C.

They nave similar CPU usage, scalability, and network convergence times.

C.

They nave similar CPU usage, scalability, and network convergence times.

Answers
D.

They both support autosummarization

D.

They both support autosummarization

Answers
Suggested answer: C


Refer to the exhibit. What is the cause of the communication failure between R1 and R4?

A.

R1 is configured with the no ip unreachables command.

A.

R1 is configured with the no ip unreachables command.

Answers
B.

R2 is denying ICMP

B.

R2 is denying ICMP

Answers
C.

R4 is denying ICMP.

C.

R4 is denying ICMP.

Answers
D.

R3 is denying ICMP.

D.

R3 is denying ICMP.

Answers
Suggested answer: A

What is a characteristics of Cisco SD-WAN?

A.

operates over DTLS/TLS authenticated and secured tunnels

A.

operates over DTLS/TLS authenticated and secured tunnels

Answers
B.

requires manual secure tunnel configuration

B.

requires manual secure tunnel configuration

Answers
C.

uses unique per-device feature templates

C.

uses unique per-device feature templates

Answers
D.

uses control connections between routers

D.

uses control connections between routers

Answers
Suggested answer: A

Which configuration enables a device to be configured via NETCONF over SSHv2?

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: C

When is GLBP preferred over HSRP?

A.

When encrypted helm are required between gateways h a single group.

A.

When encrypted helm are required between gateways h a single group.

Answers
B.

When the traffic load needs to be shared between multiple gateways using a single virtual IP.

B.

When the traffic load needs to be shared between multiple gateways using a single virtual IP.

Answers
C.

When the gateway routers are a mix of Cisco and non-Cisco routers

C.

When the gateway routers are a mix of Cisco and non-Cisco routers

Answers
D.

When clients need the gateway MAC address lo Be the same between multiple gateways

D.

When clients need the gateway MAC address lo Be the same between multiple gateways

Answers
Suggested answer: B

Refer to the exhibit. Why was the response code generated?

A.

The resource was unreachable

A.

The resource was unreachable

Answers
B.

Access was denied based on the user permissions.

B.

Access was denied based on the user permissions.

Answers
C.

The resource 15 no longer available on the server.

C.

The resource 15 no longer available on the server.

Answers
D.

There Is a conflict in the current stale of the resource.

D.

There Is a conflict in the current stale of the resource.

Answers
Suggested answer: B

Refer to the exhibit. A network engineer Is troubleshooting an Issue with the file server based on reports of slow file transmissions. Which two commands or command sets are required. In switch SW1 to analyze the traffic from the file server with a packet analyzer? (Choose two.)

A.


A.


Answers
B.


B.


Answers
C.


C.


Answers
D.


D.


Answers
Suggested answer: A, C

An engineer must configure router R1 to validate user logins via RADIUS and fall back to the local user database if the RADIUS server is not available. Which configuration must be applied?

A.

aaa authorization exec default radius local

A.

aaa authorization exec default radius local

Answers
B.

aaa authorization exec default radius

B.

aaa authorization exec default radius

Answers
C.

aaa authentication exec default radius local

C.

aaa authentication exec default radius local

Answers
D.

aaa authentication exec default radius

D.

aaa authentication exec default radius

Answers
Suggested answer: C

DRAG DROP

Drag and drop the characteristics from the left onto the deployment model on the right.


Question 740
Correct answer: Question 740
Total 983 questions
Go to page: of 99