Cisco 350-401 Practice Test - Questions Answers, Page 85

List of questions
Question 841

A customer requires their wireless network to be fully functional, even if the wireless controller fails. Which wireless design supports these requirements?
Question 842

A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
Question 843

Which of the following protocols has a default administrative distance value of 90?
Question 844

Which of the following security methods uses physical characteristics of a person to authorize access to a location?
Question 845

Which of the following attacks becomes more effective because of global leakages of users' passwords?
Question 846

A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports. Which of the following should the company implement to prevent this in the future?
Question 847

Users have reported an issue connecting to a server over the network. A workstation was recently added to the network and configured with a shared USB printer. Which of the following is most likely causing the issue?
Question 848

A company recently rearranged some users' workspaces and moved several users to different desks. The network administrator receives a report that all of the users who were moved are having connectivity issues. Which of the following is the most likely reason?
Question 849

Refer to the exhibit.
A network engineer issues the debug command while troubleshooting a network issue. What does the output confirm?
Question 850

Refer to the Exhibit.
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
* Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A)
B)
C)
D)
Question