Cisco 350-401 Practice Test - Questions Answers, Page 8

List of questions
Question 71

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
logging host 10.2.3.4 vrf mgmt transport tcp port 6514
logging host 10.2.3.4 vrf mgmt transport udp port 6514
logging host 10.2.3.4 vrf mgmt transport tcp port 514
logging host 10.2.3.4 vrf mgmt transport udp port 514
The TCP port 6514 has been allocated as the default port for syslog over Transport Layer Security (TLS).
Reference: https://tools.ietf.org/html/rfc5425
Question 72

At which Layer does Cisco DNA Center support REST controls?
EEM applets or scripts
Session layer
YMAL output from responses to API calls
Northbound APIs
Question 73

Refer to the exhibit.
Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)
The packet reaches R3, and the TTL expires
R2 replies with a TTL exceeded message
R3 replies with a TTL exceeded message.
The packet reaches R2 and the TTL expires
R1 replies with a TTL exceeded message
The packet reaches R1 and the TTL expires.
Source MAC in the capture is VMWare, MAC is Cisco. Routers first check the TTL before any further process, subtract 1 at R1. Send to R2, subtract and you have ZERO. Discard packet and reply with ICMP Time Exceeded message from that point, don't even bother checking the Route table for further processing.
Question 74

Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
MACsec
IPsec
SSL
Cisco Trustsec
MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using outofband methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the
Question 75

Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Configure less member ports on Switch2.
Configure the same port channel interface number on both switches
Configure the same EtherChannel protocol on both switches
Configure more member ports on Switch1.
In this case, we are using your EtherChannel without a negotiation protocol on Switch2. As a result, if the opposite switch is not also configured for EtherChannel operation on the respective ports, there is a danger of a switching loop. The EtherChannel Misconfiguration Guard tries to prevent that loop from occuring by disabling all the ports bundled in the EtherChannel.
Question 76

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
switch fabric
VTEP
VNID
host switch
VXLAN uses an 8-byte VXLAN header that consists of a 24-bit VNID and a few reserved bits. The VXLAN header together with the original Ethernet frame goes in the UDP payload. The 24-bit VNID is used to identify Layer 2 segments and to maintain Layer 2 isolation between the segments.
Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/vxlan/configuration/guide/b_Cisco_Nexus_9000_Series_NXOS_VXLAN_Configuration_Guide_7x/b_Cisco_Nexus_9000_Series_NXOS_VXLAN_Configuration_Guide_7x_chapter_010.html
Question 77

Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Option 43
Option 60
Option 67
Option 150
Question 78

Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
This segment has no designated router because it is a nonbroadcast network type.
This segment has no designated router because it is a p2p network type.
Router Chicago because it has a lower router ID
Router NewYork because it has a higher router ID
Question 79

What are two differences between the RIB and the FIB? (Choose two.)
The FIB is derived from the data plane, and the RIB is derived from the FIB.
The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.
FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.
The FIB is derived from the control plane, and the RIB is derived from the FIB.
The RIB is derived from the control plane, and the FIB is derived from the RIB.
Question 80

Which algorithms are used to secure REST API from brute attacks and minimize the impact?
SHA-512 and SHA-384
MD5 algorithm-128 and SHA-384
SHA-1, SHA-256, and SHA-512
PBKDF2, BCrypt, and SCrypt
One of the best practices to secure REST APIs is using password hash. Passwords must always be hashed to protect the system (or minimize the damage) even if it is compromised in some hacking attempts. There are many such hashing algorithms which can prove really effective for password security e.g. PBKDF2, bcrypt and scrypt algorithms.
Other ways to secure REST APIs are: Always use HTTPS, Never expose information on URLs
(Usernames, passwords, session tokens, and API keys should not appear in the URL), Adding Timestamp in Request, Using OAuth, Input Parameter Validation.
Reference: https://restfulapi.net/security-essentials/
Question