Cisco 350-401 Practice Test - Questions Answers, Page 8
List of questions
Related questions
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
logging host 10.2.3.4 vrf mgmt transport tcp port 6514
logging host 10.2.3.4 vrf mgmt transport udp port 6514
logging host 10.2.3.4 vrf mgmt transport tcp port 514
logging host 10.2.3.4 vrf mgmt transport udp port 514
At which Layer does Cisco DNA Center support REST controls?
EEM applets or scripts
Session layer
YMAL output from responses to API calls
Northbound APIs
Refer to the exhibit.
Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)
The packet reaches R3, and the TTL expires
R2 replies with a TTL exceeded message
R3 replies with a TTL exceeded message.
The packet reaches R2 and the TTL expires
R1 replies with a TTL exceeded message
The packet reaches R1 and the TTL expires.
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
MACsec
IPsec
SSL
Cisco Trustsec
Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?
Configure less member ports on Switch2.
Configure the same port channel interface number on both switches
Configure the same EtherChannel protocol on both switches
Configure more member ports on Switch1.
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?
switch fabric
VTEP
VNID
host switch
Which DHCP option helps lightweight APs find the IP address of a wireless LAN controller?
Option 43
Option 60
Option 67
Option 150
Refer the exhibit.
Which router is the designated router on the segment 192.168.0.0/24?
This segment has no designated router because it is a nonbroadcast network type.
This segment has no designated router because it is a p2p network type.
Router Chicago because it has a lower router ID
Router NewYork because it has a higher router ID
What are two differences between the RIB and the FIB? (Choose two.)
The FIB is derived from the data plane, and the RIB is derived from the FIB.
The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface for each packet.
FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for each packet.
The FIB is derived from the control plane, and the RIB is derived from the FIB.
The RIB is derived from the control plane, and the FIB is derived from the RIB.
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
SHA-512 and SHA-384
MD5 algorithm-128 and SHA-384
SHA-1, SHA-256, and SHA-512
PBKDF2, BCrypt, and SCrypt
Question