Cisco 350-401 Practice Test - Questions Answers, Page 91
List of questions
Related questions
Which policy feature is used with TrustSec to provide endpoint entitlement in an enterprise network?
access control lists
virtual routing and forwarding
virtual local area network
security groups tags
In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?
Switches are cross-linked at the same layer and have a single connection to each upstream distribution device.
Switches are connected to each upstream distribution and core device.
Switches are connected to each upstream distribution device.
Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.
Which component does Cisco Threat Defense use to measure bandwidth, application performance, and utilization?
TrustSec
Cisco Umbrella
Advanced Malware Protection for Endpoints
NotFlow
DRAG DROP
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
A network engineer is designing a QoS policy tor voice and video applications. Which software queuing feature provides strict-priority servicing?
Automatic QoS
Low Latency Queuing
Class-Based Weighted Fair Queuing
Link Fragmentation
Router R1must be configured as a UDP responder on port 6336 Which configuration accomplishes this task?
Option A
Option B
Option C
Option D
Refer to the exhibit.
Refer to the exhibit. What is achieved when this Python script is executed?
Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary.
Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.
All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary.
All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list.
Why are stateless calls executed by REST API useful in cloud applications?
They control URL decoding.
They rely on data stored on the server for calls
They use HTTPS to implement all calls.
They are easy to redeploy and to scale
Which capability does a distributed virtual switch have?
use advanced IPsec encryption algorithms
use floating static routes
provide configuration consistency across the hosts
run dynamic routing protocols
Refer to the exhibit.
Refer to the exhibit. Which action automatically enables privilege exec mode when logging in via SSH?
Configure user 'Cisco' with privilege level 15.
Configure a password under the line configuration.
Configure privilege level 15 under the line configuration.
Configure the enable secret to be the same as the secret for user 'Cisco*.
Question