ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 83

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

An engineer applies this configuration to R1:

ip nat inside source static 192.168.10.17 192.168.27.42

Which command set should be added to complete the configuration?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

Option C is the correct set of commands to complete the configuration of NAT on R1.The configuration steps are as follows12:

Define the inside and outside interfaces for NAT using theip nat insideandip nat outsidecommands. In this case, the inside interface is GigabitEthernet0/0 and the outside interface is GigabitEthernet0/1:interface GigabitEthernet0/0andip nat inside,interface GigabitEthernet0/1andip nat outside.

Configure a static NAT entry that maps the inside local address 192.168.10.17 to the inside global address 192.168.27.42 using theip nat inside source staticcommand:ip nat inside source static 192.168.10.17 192.168.27.42.

Verify the NAT configuration using theshow ip nat translationsandshow ip nat statisticscommands:show ip nat translationsandshow ip nat statistics.

Option A is incorrect because it does not define the inside and outside interfaces for NAT, which is required for NAT to function properly1.

Option B is incorrect because it uses theip nat outside source staticcommand, which is used to translate the source address of packets that travel from outside to inside, and the destination address of packets that travel from inside to outside.This is not the desired behavior for this scenario, where the inside local address 192.168.10.17 should be translated to the inside global address 192.168.27.42 in both directions1.

Option D is incorrect because it uses theip nat poolandip nat inside source listcommands, which are used to configure dynamic NAT or PAT, not static NAT. These commands create a pool of inside global addresses and an access list to define which inside local addresses are eligible for translation.However, in this scenario, there is only one inside local address and one inside global address, so a static NAT entry is sufficient1.Reference:1:Configure Network Address Translation,2:Static NAT

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Option A is the properly formatted JSON script. JSON (JavaScript Object Notation) is a standard text-based format for representing structured data based on JavaScript object syntax. It is commonly used for transmitting data in web applications (e.g., sending some data from the server to the client, so it can be displayed on a web page, or vice versa).The JSON syntax rules are as follows12:

Data is in name/value pairs, separated by commas. A name/value pair consists of a field name (in double quotes), followed by a colon, followed by a value:'name': 'value'.

Curly braces hold objects. An object can contain multiple name/value pairs:{'name': 'value', 'name': 'value', ...}.

Square brackets hold arrays. An array can contain multiple values, separated by commas:['value', 'value', ...].

Values can be strings (in double quotes), numbers, booleans (true or false), null, objects, or arrays.

Option A follows these rules and is a valid JSON script. It defines an object with four name/value pairs:'name','age','hobbies', and'address'. The value of'name'is a string, the value of'age'is a number, the value of'hobbies'is an array of strings, and the value of'address'is another object with two name/value pairs:'city'and'country'. The object is enclosed in curly braces and the name/value pairs are separated by commas.

Option B is not a valid JSON script because it uses single quotes instead of double quotes for the field names and string values.JSON requires double quotes for strings12.

Option C is not a valid JSON script because it does not use commas to separate the name/value pairs.JSON requires commas to separate the data elements within an object or an array12.

Option D is not a valid JSON script because it uses a semicolon instead of a colon to separate the field name and the value.JSON requires a colon to separate the name and the value in a name/value pair12.Reference:1:JSON Introduction,2:JSON Syntax

Refer to the exhibit.

Clients are reporting an issue with the voice traffic from the branch site to the central site. What is the cause of this issue?

A.

The voice traffic is using the link with less available bandwidth.

A.

The voice traffic is using the link with less available bandwidth.

Answers
B.

There is a routing loop on the network.

B.

There is a routing loop on the network.

Answers
C.

Traffic is load-balancing over both links, causing packets to arrive out of order.

C.

Traffic is load-balancing over both links, causing packets to arrive out of order.

Answers
D.

There is a high delay on the WAN links.

D.

There is a high delay on the WAN links.

Answers
Suggested answer: C

Explanation:

Traffic is load-balancing over both links, causing packets to arrive out of order. This can cause voice quality issues, such as jitter and delay. To avoid this problem, voice traffic should be sent over a single path, using a routing protocol that supports unequal-cost load balancing, such as EIGRP. The source of this answer is the Cisco ENCOR v1.1 course, module 4, lesson 4.3: Implementing EIGRP.

Refer to the exhibit.

An engineer must send the 172.16.2.0 /24 user traffic to a packet capture tool to troubleshoot an issue. Which action completes the configuration?

A.

Encrypt the traffic between the users and the monitoring servers.

A.

Encrypt the traffic between the users and the monitoring servers.

Answers
B.

Disable the spanning tree protocol on the monitoring server VLAN.

B.

Disable the spanning tree protocol on the monitoring server VLAN.

Answers
C.

Enable the Cisco Discovery Protocol on the server interfaces.

C.

Enable the Cisco Discovery Protocol on the server interfaces.

Answers
D.

Define the remote span VLAN on SW1 and SW2.

D.

Define the remote span VLAN on SW1 and SW2.

Answers
Suggested answer: D

Explanation:

This is because the remote span VLAN is used to transport the mirrored traffic from the source switch to the destination switch, where the monitoring server is connected. The remote span VLAN must be defined on both switches and must not be used for any other purpose. The source of this answer is the Cisco ENCOR v1.1 course, module 6, lesson 6.2: Implementing SPAN, RSPAN, and ERSPAN.

DRAG DROP

Drag and drop the code snippets from the bottom onto the blanks in the Python script to convert a Python object into a JSON string. Not all options are used.


Question 825
Correct answer: Question 825

A wireless network engineer must configure a WPA2+WPA3 policy with the Personal security type. Which action meets this requirement?

A.

Configure the GCMP256 encryption cipher.

A.

Configure the GCMP256 encryption cipher.

Answers
B.

Configure the CCMP256 encryption cipher.

B.

Configure the CCMP256 encryption cipher.

Answers
C.

Configure the CCMP128 encryption cipher.

C.

Configure the CCMP128 encryption cipher.

Answers
D.

Configure the GCMP128 encryption cipher.

D.

Configure the GCMP128 encryption cipher.

Answers
Suggested answer: A

Explanation:

This is because the GCMP256 cipher is the only one that supports both WPA2 and WPA3 with the Personal security type. The GCMP256 cipher provides stronger encryption and authentication than the CCMP ciphers, which are only compatible with WPA2. The source of this answer is the Cisco ENCOR v1.1 course, module 7, lesson 7.2: Implementing WPA2 and WPA3.

Refer to the exhibit.

Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?

A.

action 2.0 cli command 'write_backup.tcl tcl'

A.

action 2.0 cli command 'write_backup.tcl tcl'

Answers
B.

action 2.0 cli command 'flash:write_backup.tcl'

B.

action 2.0 cli command 'flash:write_backup.tcl'

Answers
C.

action 2.0 cli command 'write_backup.tcl'

C.

action 2.0 cli command 'write_backup.tcl'

Answers
D.

action 2.0 cli command 'telsh flash:write_backup.tcl'

D.

action 2.0 cli command 'telsh flash:write_backup.tcl'

Answers
Suggested answer: B

Explanation:

This is because the EEM applet needs to specify the full path of the Tcl script that is stored in the flash memory of the device. The script name is write_backup.tcl and it is used to backup the running configuration to a remote server. The source of this answer is the Cisco ENCOR v1.1 course, module 8, lesson 8.3: Implementing Embedded Event Manager.

Refer to the exhibit.

Which HTTP request produced the REST API response that was returned by Cisco DNA Center?

A.

fetch /network-device?macAddress=ac:4a:56:6c:7c:00

A.

fetch /network-device?macAddress=ac:4a:56:6c:7c:00

Answers
B.

POST/network-device?macAddress=ac:4a:56:6c:7c:00

B.

POST/network-device?macAddress=ac:4a:56:6c:7c:00

Answers
C.

GET/network-device?macAddress=ac:4a:56:6c:7c:00

C.

GET/network-device?macAddress=ac:4a:56:6c:7c:00

Answers
Suggested answer: C

Explanation:

This is because the REST API response shows the details of a network device with the specified MAC address. The GET method is used to retrieve information from the Cisco DNA Center server. The network-device resource is used to access the network device inventory. The macAddress parameter is used to filter the results by the MAC address of the device. The source of this answer is the Cisco ENCOR v1.1 course, module 8, lesson 8.4: Implementing REST API.

What function does VXLAN perform in a Cisco SD-Access deployment?

A.

data plane forwarding

A.

data plane forwarding

Answers
B.

control plane forwarding

B.

control plane forwarding

Answers
C.

systems management and orchestration

C.

systems management and orchestration

Answers
D.

policy plane forwarding

D.

policy plane forwarding

Answers
Suggested answer: A

Explanation:

This is because VXLAN is a network virtualization technology that encapsulates Layer 2 frames in UDP headers and allows them to be transported over Layer 3 networks. VXLAN is used in Cisco SD-Access to create virtual networks that span across multiple physical locations and devices. VXLAN performs the data plane forwarding function, which is responsible for moving packets from one point to another based on the destination address. The source of this answer is the Cisco ENCOR v1.1 course, module 9, lesson 9.2: Implementing VXLAN.

DRAG DROP

Drag and drop the automation characteristics from the left onto the corresponding tools on the right. Not all options are used.


Question 830
Correct answer: Question 830
Total 983 questions
Go to page: of 99