ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 91

Question list
Search
Search

Related questions











Which policy feature is used with TrustSec to provide endpoint entitlement in an enterprise network?

A.

access control lists

A.

access control lists

Answers
B.

virtual routing and forwarding

B.

virtual routing and forwarding

Answers
C.

virtual local area network

C.

virtual local area network

Answers
D.

security groups tags

D.

security groups tags

Answers
Suggested answer: D

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

A.

Switches are cross-linked at the same layer and have a single connection to each upstream distribution device.

A.

Switches are cross-linked at the same layer and have a single connection to each upstream distribution device.

Answers
B.

Switches are connected to each upstream distribution and core device.

B.

Switches are connected to each upstream distribution and core device.

Answers
C.

Switches are connected to each upstream distribution device.

C.

Switches are connected to each upstream distribution device.

Answers
D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Answers
Suggested answer: C

Which component does Cisco Threat Defense use to measure bandwidth, application performance, and utilization?

A.

TrustSec

A.

TrustSec

Answers
B.

Cisco Umbrella

B.

Cisco Umbrella

Answers
C.

Advanced Malware Protection for Endpoints

C.

Advanced Malware Protection for Endpoints

Answers
D.

NotFlow

D.

NotFlow

Answers
Suggested answer: D

DRAG DROP

Drag and drop the descriptions from the left onto the routing protocol they describe on the right.


Question 904
Correct answer: Question 904

A network engineer is designing a QoS policy tor voice and video applications. Which software queuing feature provides strict-priority servicing?

A.

Automatic QoS

A.

Automatic QoS

Answers
B.

Low Latency Queuing

B.

Low Latency Queuing

Answers
C.

Class-Based Weighted Fair Queuing

C.

Class-Based Weighted Fair Queuing

Answers
D.

Link Fragmentation

D.

Link Fragmentation

Answers
Suggested answer: B

Router R1must be configured as a UDP responder on port 6336 Which configuration accomplishes this task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Refer to the exhibit.

Refer to the exhibit. What is achieved when this Python script is executed?

A.

Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary.

A.

Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary.

Answers
B.

Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.

B.

Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.

Answers
C.

All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary.

C.

All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary.

Answers
D.

All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list.

D.

All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list.

Answers
Suggested answer: D

Why are stateless calls executed by REST API useful in cloud applications?

A.

They control URL decoding.

A.

They control URL decoding.

Answers
B.

They rely on data stored on the server for calls

B.

They rely on data stored on the server for calls

Answers
C.

They use HTTPS to implement all calls.

C.

They use HTTPS to implement all calls.

Answers
D.

They are easy to redeploy and to scale

D.

They are easy to redeploy and to scale

Answers
Suggested answer: D

Which capability does a distributed virtual switch have?

A.

use advanced IPsec encryption algorithms

A.

use advanced IPsec encryption algorithms

Answers
B.

use floating static routes

B.

use floating static routes

Answers
C.

provide configuration consistency across the hosts

C.

provide configuration consistency across the hosts

Answers
D.

run dynamic routing protocols

D.

run dynamic routing protocols

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. Which action automatically enables privilege exec mode when logging in via SSH?

A.

Configure user 'Cisco' with privilege level 15.

A.

Configure user 'Cisco' with privilege level 15.

Answers
B.

Configure a password under the line configuration.

B.

Configure a password under the line configuration.

Answers
C.

Configure privilege level 15 under the line configuration.

C.

Configure privilege level 15 under the line configuration.

Answers
D.

Configure the enable secret to be the same as the secret for user 'Cisco*.

D.

Configure the enable secret to be the same as the secret for user 'Cisco*.

Answers
Suggested answer: A
Total 983 questions
Go to page: of 99