ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 82

Question list
Search
Search

List of questions

Search

Related questions











An engineer must use flexible NetFlow on a group of switches. To prevent overloading of the flow collector, if the flow is idle for 20 seconds, the flow sample should be exported. Which command set should be applied?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

Option C is the correct set of commands to apply flexible NetFlow on a group of switches with the given requirement.The configuration steps are as follows12:

Define a flow record that specifies the fields to be collected and exported for the flows. In this case, the flow record is namedFNF-RECORDand it collects the source and destination IP addresses, the input and output interfaces, the transport protocol, and the source and destination port numbers:flow record FNF-RECORDandmatch ipv4 source address,match ipv4 destination address,match interface input,match interface output,match transport protocol,match transport source-port,match transport destination-port.

Define a flow exporter that specifies the destination and transport protocol for sending the flow data. In this case, the flow exporter is namedFNF-EXPORTERand it uses UDP port 9996 to send the flow data to the IP address 10.10.10.10:flow exporter FNF-EXPORTERanddestination 10.10.10.10,transport udp 9996.

Define a flow monitor that applies the flow record and the flow exporter to the monitored traffic. In this case, the flow monitor is namedFNF-MONITORand it uses the flow recordFNF-RECORDand the flow exporterFNF-EXPORTER. It also sets the cache timeout for inactive flows to 20 seconds, which means that the flow sample will be exported if the flow is idle for 20 seconds:flow monitor FNF-MONITORandrecord FNF-RECORD,exporter FNF-EXPORTER,cache timeout inactive 20.

Apply the flow monitor to the interfaces that need to be monitored. In this case, the flow monitorFNF-MONITORis applied to the input and output direction of the interface GigabitEthernet0/1:interface GigabitEthernet0/1andip flow monitor FNF-MONITOR input,ip flow monitor FNF-MONITOR output.

Option A is incorrect because it does not set the cache timeout for inactive flows to 20 seconds, which is required by the question.The default cache timeout for inactive flows is 15 seconds1.

Option B is incorrect because it does not apply the flow monitor to the output direction of the interface, which is required to capture both incoming and outgoing traffic on the interface1.

Option D is incorrect because it does not use a flow record to specify the fields to be collected and exported for the flows, which is required to customize the flow data according to the user's needs1.Reference:1:Configuring Flexible NetFlow,2:Flexible NetFlow Configuration Guide

What is a characteristic of the Cisco DMA Center Template Editor feature?

A.

It facilitates software upgrades lo network devices from a central point.

A.

It facilitates software upgrades lo network devices from a central point.

Answers
B.

It facilitates a vulnerability assessment of the network devices.

B.

It facilitates a vulnerability assessment of the network devices.

Answers
C.

It provides a high-level overview of the health of every network device.

C.

It provides a high-level overview of the health of every network device.

Answers
D.

It uses a predefined configuration through parameterized elements or variables.

D.

It uses a predefined configuration through parameterized elements or variables.

Answers
Suggested answer: D

Explanation:

This is because the Cisco DNA Center Template Editor feature is a tool that allows the network administrator to create and deploy configuration templates to multiple network devices. The configuration templates use parameterized elements or variables, which are placeholders for values that can be customized for each device. For example, a variable can represent the hostname, IP address, or interface number of a device. The parameterized elements or variables can be defined manually or automatically using the Cisco DNA Center inventory. The source of this answer is the Cisco ENCOR v1.1 course, module 8, lesson 8.5: Implementing Network Configuration Management.

Refer to the exhibit.

Link 1 uses a copper connection and link 2 uses a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by Spanning Tree. After entering the spanning-tree port-priority 32 command on G0/1 on SW2, the port remains blocked. Which command should be entered on the ports connected to Link 2 is resolve the issue?

A.

Enter spanning-tree port-priority 64 on SW2

A.

Enter spanning-tree port-priority 64 on SW2

Answers
B.

Enter spanning-tree port-priority 224 on SW1.

B.

Enter spanning-tree port-priority 224 on SW1.

Answers
C.

Enter spanning-tree port-priority 4 on SW2.

C.

Enter spanning-tree port-priority 4 on SW2.

Answers
D.

Enter spanning-tree port-priority 32 on SW1.

D.

Enter spanning-tree port-priority 32 on SW1.

Answers
Suggested answer: D

Which behavior can be expected when the HSRP versions is changed from 1 to 2?

A.

Each HSRP group reinitializes because the virtual MAC address has changed.

A.

Each HSRP group reinitializes because the virtual MAC address has changed.

Answers
B.

No changes occur because version 1 and 2 use the same virtual MAC OUI.

B.

No changes occur because version 1 and 2 use the same virtual MAC OUI.

Answers
C.

Each HSRP group reinitializes because the multicast address has changed.

C.

Each HSRP group reinitializes because the multicast address has changed.

Answers
D.

No changes occur because the standby router is upgraded before the active router.

D.

No changes occur because the standby router is upgraded before the active router.

Answers
Suggested answer: A

A company hires a network architect to design a new OTT wireless solution within a Cisco SD-Access Fabric wired network. The architect wants to register access points to the WLC to centrally switch the traffic. Which AP mode must the design include?

A.

Bridge

A.

Bridge

Answers
B.

Fabric

B.

Fabric

Answers
C.

FlexConnect

C.

FlexConnect

Answers
D.

local

D.

local

Answers
Suggested answer: D

Why would an architect use an OSPF virtual link?

A.

to allow a stub area to transit another stub area

A.

to allow a stub area to transit another stub area

Answers
B.

to connect two networks that have overlapping private IP address space

B.

to connect two networks that have overlapping private IP address space

Answers
C.

to merge two existing Area Os through a nonbackbone

C.

to merge two existing Area Os through a nonbackbone

Answers
D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Answers
Suggested answer: D

Explanation:

A virtual link is a logical connection between two OSPF routers that belong to different areas but share a common border with a transit area. A virtual link allows an OSPF router to participate in the backbone area (Area 0) even if it is not physically connected to it. This way, the OSPF network can maintain connectivity and routing consistency across all areas.A virtual link is configured between the OSPF router IDs of the two routers that need to be connected to the backbone area123.

Option A is incorrect because a stub area is an area that does not receive external routes from other autonomous systems or other OSPF areas.A stub area can only transit traffic to and from the backbone area, and it cannot be used as a transit area for a virtual link12.

Option B is incorrect because a virtual link does not change the IP address space of the networks that it connects. A virtual link is transparent to the IP layer and only affects the OSPF routing protocol.To connect two networks that have overlapping private IP address space, other solutions such as NAT or VPN are required12.

Option C is incorrect because a virtual link cannot merge two existing Area 0s through a nonbackbone area. A virtual link can only extend an existing Area 0 through a nonbackbone area. If there are two separate Area 0s in an OSPF network, they cannot be merged by a virtual link, and the network is considered to be partitioned.A partitioned network can cause routing loops and inconsistencies, and it should be avoided12.Reference:1:Configure OSPF Connection in a Virtual Link Environment,2:How to configure OSPF Virtual Link,3:Understand OSPF Areas and Virtual Links

High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address 192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Option A is the correct configuration to set NetFlow data export and capture on the router. This option enables NetFlow data export to the Cisco DNA Center with the IP address 192.168.23.1 and UDP port 23000, and also enables the ip flow-top-talkers command on the interface Gig0/1.The ip flow-top-talkers command displays the top talkers (the source and destination pairs that are consuming the most bandwidth) on the interface, based on the NetFlow statistics collected by the router12.

Option B is incorrect because it does not enable the ip flow-top-talkers command on the interface Gig0/1, which is required to identify the flows that are consuming the most bandwidth.The collect counter bytes command is used to specify the fields to be collected by Flexible NetFlow, which is a different feature from NetFlow3.

Option C is incorrect because it does not specify the UDP port for the NetFlow data export destination, which is required to send the NetFlow packets to the Cisco DNA Center.The default UDP port for NetFlow is 9996, which does not match the port configured on the Cisco DNA Center4.

Option D is incorrect because it does not enable NetFlow data export on the router, which is required to send the NetFlow statistics to the Cisco DNA Center.The ip flow-export source command is used to specify the source IP address of the NetFlow packets, but it does not enable the NetFlow data export feature4.Reference:1:ip flow-top-talkers,2:Capture NetFlow data,3:collect counter bytes,4:ip flow-export destination

Refer to the exhibit. What is the result of this Python code?

A.

1

A.

1

Answers
B.

0

B.

0

Answers
C.

7

C.

7

Answers
D.

7.5

D.

7.5

Answers
Suggested answer: D

Explanation:

The Python code in the exhibit defines a function calledaveragethat takes two parametersaandband returns the arithmetic mean of them. The function is then called with the arguments5and10, which are assigned toaandbrespectively. The function returns(5 + 10) / 2, which is7.5. Therefore, the result of the Python code is7.5.Reference:Python Functions,Python Arithmetic Operators

An engineer must configure Interface and sensor monitoring on a router. The NMS server is located in a trusted zone with IP address 10.15.2.19. Communication between the router and the NMS server must be encrypted and password-protected using the most secure algorithms. Access must be allowed only for the NMS server and with the minimum permission levels needed. Which configuration must the engineer apply?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Option A is the correct configuration to apply interface and sensor monitoring on a router with the given requirements. This option uses SNMPv3, which is the most secure version of SNMP that supports encryption and authentication.The configuration steps are as follows12:

Create an access list namednmsthat permits only the NMS server with IP address 10.15.2.19 to access the router:ip access-list standard nmsandpermit 10.15.2.19 0.0.0.0.

Create a view namedrwthat includes all the SNMP objects:snmp-server view rw included.

Create a group namednmsthat uses SNMPv3 with privacy (encryption) and authentication, and assigns the viewrwand the access listnmsto the group:snmp-server group nms v3 priv read rw access nms.

Create a user namednmsthat belongs to the groupnmsand uses DES for authentication and AES for encryption, with the passwordsdespassandaespassrespectively:snmp-server user nms nms v3 auth des despass priv aes 192 aespass.

Option B is incorrect because it does not use encryption for SNMP communication, which is required by the question.Thenoauthkeyword in thesnmp-server groupcommand means that no authentication or encryption is used, which makes the SNMP packets vulnerable to eavesdropping and tampering1.

Option C is incorrect because it does not use the most secure algorithms for SNMP communication, which is required by the question. Themd5anddeskeywords in thesnmp-server usercommand mean that MD5 and DES are used for authentication and encryption respectively, which are considered weak and outdated algorithms.AES and SHA are recommended instead1.

Option D is incorrect because it does not restrict the access to the NMS server only, which is required by the question. Thesnmp-server communitycommand creates a community string that acts as a password for SNMP access, but it does not specify an access list to limit the source IP addresses that can use the community string.Therefore, any device that knows the community string can access the router via SNMP1.Reference:1:Configuring SNMPv3,2:SNMP Configuration Guide, Cisco IOS XE Gibraltar 16.12.x

What mechanism does PIM use to forward multicast traffic?

A.

PIM sparse mode uses a pull model to deliver multicast traffic.

A.

PIM sparse mode uses a pull model to deliver multicast traffic.

Answers
B.

PIM dense mode uses a pull model to deliver multicast traffic.

B.

PIM dense mode uses a pull model to deliver multicast traffic.

Answers
C.

PIM sparse mode uses receivers to register with the RP.

C.

PIM sparse mode uses receivers to register with the RP.

Answers
D.

PIM sparse mode uses a flood and prune model to deliver multicast traffic.

D.

PIM sparse mode uses a flood and prune model to deliver multicast traffic.

Answers
Suggested answer: A

Explanation:

PIM sparse mode uses a pull model to deliver multicast traffic. This means that multicast traffic is only forwarded to routers that have explicitly requested it, using join messages. This reduces the amount of unnecessary traffic on the network and allows for efficient use of bandwidth. The source of this answer is the Cisco ENCOR v1.1 course, module 5, lesson 5.2: Implementing PIM Sparse Mode.

Total 983 questions
Go to page: of 99