Cisco 350-401 Practice Test - Questions Answers, Page 87
List of questions
Related questions
Which tag defines the properties to be applied to each specific WLAN?
RF tag
policy tag
AP tag
site tag
Which device, in a LISP routing architecture, receives LISP map requests and determines which ETR should handle the map request?
proxy ETR
routing locator
map server
map resolver
Refer to the exhibit.
Refer to the exhibit. An engineer attempts to use RESTCONF to configure GigabitEthernet2 on a remote router with IP address 192.168.159.10. but the configuration fails. Which configuration is required to complete the action?
Option A
Option B
Option C
Option D
An engineer must construct an access list for a Cisco Catalyst 9800 Series WLC that will redirect wireless guest users to a splash page that is hosted on a Cisco ISE server The Cisco ISE servers are hosted at 10 9 11 141 and 10 1 11 141 Which access list meets the requirements?
Option A
Option B
Option C
Option D
What is the role of vSmart in a Cisco SD-WAN environment?
to monitor, configure, and maintain SD-WAN devices
to establish secure control plane connections
to provide secure data plane connectivity over WAN Inks
to perform initial authentication of devices
Refer to the exhibit.
Refer to the exhibit. What is the result of the configuration?
It enables NTP in client mode
It allows interface g0/1 to send and receive NTP broadcast packets
It allows interface g0/1 to send NTP broadcast packets.
It allows interface g0/1 to receive NTP broadcast packets.
When should the MAC authentication bypass feature be used on a switch port?
when authentication is required, but the attached host does not support 802.1X
when the attached host supports limited 802.1X
when authentication should be bypassed for select hosts based on their MAC address
when the attached host supports 802.1X and must authenticate itself based on its MAC address instead of user credentials
What are two benefits of using Cisco TrustSec? (Choose two.)
consistent network segmentation
advanced endpoint protection against malware
simplified management of network access
unknown file analysis using sandboxing
end-to-end traffic encryption
What is a characteristic of Layer 3 roaming?
It provides seamles roaming between APs that are connected to different Layer 3 networks and different mobility groups.
It is only supported on controllers that run SSO.
It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group
Clients must obtain a new IP address when they roam between APs
Refer to the exhibit.
Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?
Option A
Option B
Option C
Option D
Question