ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 84

Question list
Search
Search

List of questions

Search

Related questions











DRAG DROP

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used.


Question 831
Correct answer: Question 831

A network administrator received reports that a 40Gb connection is saturated. The only server the administrator can use for data collection in that location has a 10Gb connection to the network. Which of the following is the best method to use on the server to determine the source of the saturation?

A.

Port mirroring

A.

Port mirroring

Answers
B.

Log aggregation

B.

Log aggregation

Answers
C.

Flow data

C.

Flow data

Answers
D.

Packet capture

D.

Packet capture

Answers
Suggested answer: C

Explanation:

This is because flow data is a method of collecting and analyzing information about the traffic flows on a network. Flow data can provide details such as the source and destination IP addresses, ports, protocols, and bytes transferred for each flow. Flow data can help identify the source of the saturation by showing which hosts and applications are generating or consuming the most bandwidth. Flow data can be collected using protocols such as NetFlow, IPFIX, or sFlow. The source of this answer is the Cisco ENCOR v1.1 course, module 10, lesson 10.1: Implementing NetFlow and IPFIX.

A VoIP phone is plugged in to a port but cannot receive calls. Which of the following needs to be done on the port to address the issue?

A.

Trunk all VLANs on the port.

A.

Trunk all VLANs on the port.

Answers
B.

Configure the native VLAN.

B.

Configure the native VLAN.

Answers
C.

Tag the traffic to voice VLAN.

C.

Tag the traffic to voice VLAN.

Answers
D.

Disable VLANs.

D.

Disable VLANs.

Answers
Suggested answer: C

Explanation:

This is because the voice VLAN is a special VLAN that is used to separate the voice traffic from the data traffic on a switch port. The voice VLAN allows the VoIP phone to communicate with the voice server and receive calls. The voice VLAN is usually configured with a higher priority than the data VLAN to ensure the quality of service for the voice traffic. The voice VLAN is tagged with a VLAN ID that is different from the data VLAN ID. The switch port must be configured to tag the traffic to the voice VLAN, either manually or automatically using protocols such as CDP or LLDP. The source of this answer is the Cisco ENCOR v1.1 course, module 3, lesson 3.2: Implementing VLANs and Trunks.

Which of the following fiber connector types is the most likely to be used on a network interface card?

A.

LC

A.

LC

Answers
B.

SC

B.

SC

Answers
C.

ST

C.

ST

Answers
D.

MPO

D.

MPO

Answers
Suggested answer: A

Explanation:

This is because the LC connector is a small form factor connector that is commonly used on network interface cards (NICs) and transceivers. The LC connector has a push-pull locking mechanism that makes it easy to insert and remove. The LC connector can support both single-mode and multimode fibers. The LC connector is also compatible with the SFP and SFP+ transceiver modules that are widely used on NICs. The source of this answer is the Cisco ENCOR v1.1 course, module 1, lesson 1.3: Comparing Copper and Fiber Cabling.

A network administrator is designing a new network for a company that has frequent power spikes. The company wants to ensure that employees can the best solution for the administrator to recommend?

A.

Generator

A.

Generator

Answers
B.

Cold site

B.

Cold site

Answers
C.

Redundant power supplies

C.

Redundant power supplies

Answers
D.

Uninterruptible power supply

D.

Uninterruptible power supply

Answers
Suggested answer: D

Explanation:

This is because an uninterruptible power supply (UPS) is a device that provides backup power to a network device or a computer in case of a power outage or a power spike. A UPS can prevent data loss, corruption, or damage to the device by providing a smooth and continuous power supply. A UPS can also protect the device from power surges, brownouts, or voltage fluctuations. The source of this answer is the Cisco ENCOR v1.1 course, module 2, lesson 2.1: Implementing Device Hardening.

Which of the following should a junior security administrator recommend implementing to mitigate malicious network activity?

A.

Intrusion prevention system

A.

Intrusion prevention system

Answers
B.

Load balancer

B.

Load balancer

Answers
C.

Access logging

C.

Access logging

Answers
D.

Endpoint encryption

D.

Endpoint encryption

Answers
Suggested answer: A

Explanation:

This is because an intrusion prevention system (IPS) is a security device that monitors the network traffic and detects and blocks any malicious or suspicious activity, such as attacks, exploits, or malware. An IPS can help mitigate malicious network activity by preventing it from reaching the intended target or spreading to other devices on the network. An IPS can also alert the administrator of any potential threats and provide information for further analysis and response. The source of this answer is the Cisco ENCOR v1.1 course, module 2, lesson 2.5: Implementing Firewall Technologies.

A technician needs to find the MAC address of a connecting router. Which of the following commands should the technician use?

A.

arp

A.

arp

Answers
B.

traceroute

B.

traceroute

Answers
C.

nslookup

C.

nslookup

Answers
D.

ping

D.

ping

Answers
Suggested answer: A

Explanation:

This is because the arp command is used to display or manipulate the Address Resolution Protocol (ARP) cache, which is a table that maps IP addresses to MAC addresses. The arp command can show the MAC address of a connecting router by using the -a option, which displays the current ARP entries. For example, arp -a 192.168.1.1 will show the MAC address of the router with the IP address 192.168.1.1. The source of this answer is the Cisco ENCOR v1.1 course, module 3, lesson 3.1: Implementing IPv4 and IPv6 Addressing.

An engineer uses the Design workflow to create a new network infrastructure in Cisco DNA Center. How is the physical network device hierarchy structured?

A.

by organization

A.

by organization

Answers
B.

by location

B.

by location

Answers
C.

by hostname naming convention

C.

by hostname naming convention

Answers
D.

by role

D.

by role

Answers
Suggested answer: B

Explanation:

This is because the Design workflow in Cisco DNA Center allows the engineer to create a new network infrastructure by defining the physical network device hierarchy based on the location of the devices. The location hierarchy consists of four levels: global, area, building, and floor. The engineer can add, edit, or delete locations and assign devices to them. The location hierarchy helps to organize the network devices and apply policies and settings based on the location. The source of this answer is the Cisco ENCOR v1.1 course, module 8, lesson 8.6: Implementing Network Design Processes.

Refer to the exhibit.

Refer to the exhibit. An engineer must implement HSRP between two WAN routers. In the event R1 tails and then regains operational status, it must allow 100 seconds for the routing protocol to converge before preemption takes effect. Which configuration is required?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

Option B is the correct configuration to implement HSRP between two WAN routers with the given requirement.The configuration steps are as follows12:

Define the HSRP group number and the virtual IP address for the group using thestandby <group> ip command. In this case, the group number is 300 and the virtual IP address is 10.10.10.1:standby 300 ip 10.10.10.1.

Configure HSRP preemption and preemption delay using thestandby <group> preempt [delay [minimum] <seconds>]command. Preemption allows a router with higher priority to take over the active role from a router with lower priority. Preemption delay is the time that a router waits before taking over the active role in the HSRP group. In this case, the preemption delay is 100 seconds, which means that R1 will wait for 100 seconds before preempting R2 after R1 regains operational status:standby 300 preempt delay minimum 100.

Configure the HSRP priority for the router using thestandby <group> priority <value>command. The priority determines which router is the active router and which router is the standby router. The higher the priority, the more likely the router is to become the active router. In this case, R1 has a priority of 200 and R2 has a priority of 100, which means that R1 is the preferred active router and R2 is the standby router:standby 300 priority 200on R1 andstandby 300 priority 100on R2.

Option A is incorrect because it does not configure HSRP preemption and preemption delay, which are required by the question. Without preemption, R2 will remain the active router even if R1 has a higher priority and regains operational status.Without preemption delay, R1 will attempt to preempt R2 immediately, which may cause routing instability12.

Option C is incorrect because it configures HSRP preemption delay with thereloadkeyword, which means that the delay period applies only to the first interface-up event after the router has reloaded.This does not meet the requirement of the question, which states that the delay period should apply to any interface-up event after R1 fails and then regains operational status12.

Option D is incorrect because it configures HSRP preemption delay with thesynckeyword, which means that the delay period applies only to the first interface-up event after the router has reloaded, and only if such an event occurs within 360 seconds from reload.This does not meet the requirement of the question, which states that the delay period should apply to any interface-up event after R1 fails and then regains operational status, and without any time limit12.Reference:1:Configuring HSRP,2:HSRP Configuration Guide

Refer to the exhibit.

What happens to access interfaces where VLAN 222 is assigned?

A.

STP BPDU guard is enabled

A.

STP BPDU guard is enabled

Answers
B.

A description 'RSPAN' is added.

B.

A description 'RSPAN' is added.

Answers
C.

They are placed into an inactive state.

C.

They are placed into an inactive state.

Answers
D.

They cannot provide PoE.

D.

They cannot provide PoE.

Answers
Suggested answer: C

Explanation:

This is because the exhibit shows the configuration of a remote SPAN (RSPAN) VLAN, which is a special VLAN that is used to transport mirrored traffic from one switch to another switch over a trunk link. The RSPAN VLAN is configured with the remote-span option, which indicates that the VLAN is dedicated for RSPAN use only. The access interfaces where the RSPAN VLAN is assigned are placed into an inactive state, which means that they cannot forward any traffic other than the mirrored traffic. The source of this answer is the Cisco ENCOR v1.1 course, module 6, lesson 6.2: Implementing SPAN, RSPAN, and ERSPAN.

Total 983 questions
Go to page: of 99