ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 78

Question list
Search
Search

Related questions











Which function is performed by vSmart in the Cisco SD-WAN architecture?

A.

distribution of IPsec keys

A.

distribution of IPsec keys

Answers
B.

Redistribution between OMP and other routing protocols

B.

Redistribution between OMP and other routing protocols

Answers
C.

facilitation of NAT detection and traversal

C.

facilitation of NAT detection and traversal

Answers
D.

execution of localized policies

D.

execution of localized policies

Answers
Suggested answer: B

An engineer must configure a multicast UDP jitter operation. Which configuration should be applied?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Which configuration protects the password for the VTY lines against over-the-shoulder attacks?

A.

username admin secret 7 6j809j23kpp43883500N7%e$

A.

username admin secret 7 6j809j23kpp43883500N7%e$

Answers
B.

service password-encryption

B.

service password-encryption

Answers
C.

line vty 04 password $25$FpM7182!

C.

line vty 04 password $25$FpM7182!

Answers
D.

line vty 0 15 password $25$FpM71f82!

D.

line vty 0 15 password $25$FpM71f82!

Answers
Suggested answer: B

DRAG DROP

Drag and drop the code snippets from the bottom onto the blanks in the code to construct a request that configures a deny rule on an access list?

Question 774
Correct answer: Question 774

DRAG DROP

Drag and drop the characteristics from the left onto the architectures on the right.


Question 775
Correct answer: Question 775

DRAG DROP

Drag the drop the description from the left onto the routing protocol they describe on the right.


Question 776
Correct answer: Question 776

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

A.

CISCO-DNA-CONTROLLER local

A.

CISCO-DNA-CONTROLLER local

Answers
B.

CAPWAP-CONTROLLER local

B.

CAPWAP-CONTROLLER local

Answers
C.

CISCO-CONTROLLER local

C.

CISCO-CONTROLLER local

Answers
D.

CISCO-CAPWAP-CONTROLLER local

D.

CISCO-CAPWAP-CONTROLLER local

Answers
Suggested answer: D

What is a characteristic of a Type 2 hypervisor?

A.

It eliminates the need for an underlying operating system.

A.

It eliminates the need for an underlying operating system.

Answers
B.

Its main task is to manage hardware resources between different operating systems

B.

Its main task is to manage hardware resources between different operating systems

Answers
C.

Problems in the base operating system can affect the entire system.

C.

Problems in the base operating system can affect the entire system.

Answers
D.

It is completely independent of the operating system

D.

It is completely independent of the operating system

Answers
Suggested answer: C

Refer to the Exhibit.

Refer to the exhibit. What is the value of the variable list after the code is run?

A.

[1, 2, 10]

A.

[1, 2, 10]

Answers
B.

[1, 2, 3, 10]

B.

[1, 2, 3, 10]

Answers
C.

[1, 2, 10, 4]

C.

[1, 2, 10, 4]

Answers
D.

[1, 10, 10, 10]

D.

[1, 10, 10, 10]

Answers
Suggested answer: B

A network administrator for a small office is adding a passive IDS to its network switch for the purpose of inspecting network traffic. Which of the following should the administrator use?

A.

SNMPtrap

A.

SNMPtrap

Answers
B.

Port mirroring

B.

Port mirroring

Answers
C.

Syslog collection

C.

Syslog collection

Answers
D.

API integration

D.

API integration

Answers
Suggested answer: B

Explanation:

This is because port mirroring is a feature that allows a switch to copy the traffic from one or more ports to another port, where a passive IDS can be connected. A passive IDS is a device that monitors the network traffic and detects any malicious or suspicious activity, but does not take any action to block or prevent it. Port mirroring can enable a passive IDS to inspect the network traffic without affecting the performance or availability of the network. The source of this answer is the Cisco ENCOR v1.1 course, module 6, lesson 6.2: Implementing SPAN, RSPAN, and ERSPAN.

Total 983 questions
Go to page: of 99