ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 87

Question list
Search
Search

Related questions











Which tag defines the properties to be applied to each specific WLAN?

A.

RF tag

A.

RF tag

Answers
B.

policy tag

B.

policy tag

Answers
C.

AP tag

C.

AP tag

Answers
D.

site tag

D.

site tag

Answers
Suggested answer: B

Which device, in a LISP routing architecture, receives LISP map requests and determines which ETR should handle the map request?

A.

proxy ETR

A.

proxy ETR

Answers
B.

routing locator

B.

routing locator

Answers
C.

map server

C.

map server

Answers
D.

map resolver

D.

map resolver

Answers
Suggested answer: D

Refer to the exhibit.

Refer to the exhibit. An engineer attempts to use RESTCONF to configure GigabitEthernet2 on a remote router with IP address 192.168.159.10. but the configuration fails. Which configuration is required to complete the action?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

An engineer must construct an access list for a Cisco Catalyst 9800 Series WLC that will redirect wireless guest users to a splash page that is hosted on a Cisco ISE server The Cisco ISE servers are hosted at 10 9 11 141 and 10 1 11 141 Which access list meets the requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

What is the role of vSmart in a Cisco SD-WAN environment?

A.

to monitor, configure, and maintain SD-WAN devices

A.

to monitor, configure, and maintain SD-WAN devices

Answers
B.

to establish secure control plane connections

B.

to establish secure control plane connections

Answers
C.

to provide secure data plane connectivity over WAN Inks

C.

to provide secure data plane connectivity over WAN Inks

Answers
D.

to perform initial authentication of devices

D.

to perform initial authentication of devices

Answers
Suggested answer: B

Refer to the exhibit.

Refer to the exhibit. What is the result of the configuration?

A.

It enables NTP in client mode

A.

It enables NTP in client mode

Answers
B.

It allows interface g0/1 to send and receive NTP broadcast packets

B.

It allows interface g0/1 to send and receive NTP broadcast packets

Answers
C.

It allows interface g0/1 to send NTP broadcast packets.

C.

It allows interface g0/1 to send NTP broadcast packets.

Answers
D.

It allows interface g0/1 to receive NTP broadcast packets.

D.

It allows interface g0/1 to receive NTP broadcast packets.

Answers
Suggested answer: C

When should the MAC authentication bypass feature be used on a switch port?

A.

when authentication is required, but the attached host does not support 802.1X

A.

when authentication is required, but the attached host does not support 802.1X

Answers
B.

when the attached host supports limited 802.1X

B.

when the attached host supports limited 802.1X

Answers
C.

when authentication should be bypassed for select hosts based on their MAC address

C.

when authentication should be bypassed for select hosts based on their MAC address

Answers
D.

when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials

D.

when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials

Answers
Suggested answer: A

What are two benefits of using Cisco TrustSec? (Choose two.)

A.

consistent network segmentation

A.

consistent network segmentation

Answers
B.

advanced endpoint protection against malware

B.

advanced endpoint protection against malware

Answers
C.

simplified management of network access

C.

simplified management of network access

Answers
D.

unknown file analysis using sandboxing

D.

unknown file analysis using sandboxing

Answers
E.

end-to-end traffic encryption

E.

end-to-end traffic encryption

Answers
Suggested answer: A, C

What is a characteristic of Layer 3 roaming?

A.

It provides seamles roaming between APs that are connected to different Layer 3 networks and different mobility groups.

A.

It provides seamles roaming between APs that are connected to different Layer 3 networks and different mobility groups.

Answers
B.

It is only supported on controllers that run SSO.

B.

It is only supported on controllers that run SSO.

Answers
C.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group

C.

It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group

Answers
D.

Clients must obtain a new IP address when they roam between APs

D.

Clients must obtain a new IP address when they roam between APs

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C
Total 983 questions
Go to page: of 99