ExamGecko
Home Home / Cisco / 350-401

Cisco 350-401 Practice Test - Questions Answers, Page 92

Question list
Search
Search

Related questions











What is the function of an RP in a PIM-SM network?

A.

to provide routing to the PIM leaf routers

A.

to provide routing to the PIM leaf routers

Answers
B.

to track sources and recovers on the shared distribution tree

B.

to track sources and recovers on the shared distribution tree

Answers
C.

to automate the distribution of group-to rendezvous point mappings

C.

to automate the distribution of group-to rendezvous point mappings

Answers
D.

to connect multicast sources with receivers

D.

to connect multicast sources with receivers

Answers
Suggested answer: B

Refer to the exhibit.

An engineer is creating a Pytnon script to fetch the BGP configuration from a device using RESTCONF. What does the output Indicate?

A.

The BGP data resource identifier in the URL Incorrect.

A.

The BGP data resource identifier in the URL Incorrect.

Answers
B.

There is no BGP process running on the device

B.

There is no BGP process running on the device

Answers
C.

RESTCONF is not enabled on the device.

C.

RESTCONF is not enabled on the device.

Answers
Suggested answer: A

Which port is required to allow APs to join a WLC when directed broadcasts are used on a Cisco iOS switch?

A.

UDP5246

A.

UDP5246

Answers
B.

TCP 5246

B.

TCP 5246

Answers
C.

TCP 5247

C.

TCP 5247

Answers
D.

UDP5247

D.

UDP5247

Answers
Suggested answer: D

Explanation:

APs use UDP as a transport protocol, and port 5247 is required for APs to join a WLC whendirected broadcasts are used on a Cisco iOS switch. This information can be confirmed fromCisco's official documentation on Implementing and Operating Cisco Service Provider NetworkCore Technologies

Which JSON script is properly formatted?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Explanation:

The JSON script in Option D is properly formatted. A well-structured JSON script should havekey-value pairs enclosed within curly braces{}, with keys and values as strings in doublequotes''. Each key-value pair should be separated by a comma,, except for the last pair in anobject or array. The JSON script in Option D adheres to these formatting rules, making it thecorrect choice

Refer to the exhibit.

An administrator must enaWe RESTCONP access to a router. Which two commands or command sets must be added to the existing configuraton? (Choose two.)

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B, D

Explanation:

The command set in Option A is used to configure HSRP for VLAN 1200 on SW1. The commandsinclude setting the interface for VLAN 1200, assigning an IP address to that interface, andconfiguring HSRP with a standby IP address, timers, and preemption. The standby IP address isset as the last usable IP in the subnet.

Which security feature does stateless authentication and authorization use for REST API calls?

A.

OAuth 2 token

A.

OAuth 2 token

Answers
B.

API keys

B.

API keys

Answers
C.

SSL/TLS certificate encryption

C.

SSL/TLS certificate encryption

Answers
D.

Cookie-based session authentication

D.

Cookie-based session authentication

Answers
Suggested answer: A

An engineer must configure HSRP for VLAN 1200 on SW1. The second switch is configured by using the last usable IP address in the network as the virtual IP. Which command set accomplishes litis task?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

The command set in Option A is used to configure HSRP for VLAN 1200 on SW1. The commandsinclude setting the interface for VLAN 1200, assigning an IP address to that interface, andconfiguring HSRP with a standby IP address, timers, and preemption. The standby IP address isset as the last usable IP in the subnet.

Which configuration allows administrators to configure the device through the console port and use a network authentication server?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The configuration in option C is designed to allow administrators to configure the devicethrough the console port while utilizing a network authentication server. This is achieved byimplementing AAA (Authentication, Authorization, and Accounting) services, which provide aframework for controlling user access to network resources. The AAA services ensure that onlyauthenticated users can access the device, authorize the levels of access for each user, andkeep track of the actions performed by each user.

When the ''deny'' statement is used within a route map that is used for policy-based routing how is the traffic that matches the deny route-map line treated?

A.

Traffic is routed to the null 0 interface of the router and discarded.

A.

Traffic is routed to the null 0 interface of the router and discarded.

Answers
B.

Traffic is returned to the normal forwarding behavior of the router.

B.

Traffic is returned to the normal forwarding behavior of the router.

Answers
C.

An additional sequential route-map line is needed to divert the traffic to the router's normal forwarding behavior.

C.

An additional sequential route-map line is needed to divert the traffic to the router's normal forwarding behavior.

Answers
D.

An additional sequential route-map line is needed to policy route this irafic.

D.

An additional sequential route-map line is needed to policy route this irafic.

Answers
Suggested answer: B

Which action occurs during a Layer 3 roam?

A.

The client receives a new IP adcress after authentication occurs.

A.

The client receives a new IP adcress after authentication occurs.

Answers
B.

The client is marked as ''foreign' on the original controller.

B.

The client is marked as ''foreign' on the original controller.

Answers
C.

The client database entry is moved from the old controller to the new controller.

C.

The client database entry is moved from the old controller to the new controller.

Answers
D.

traffic is tunneled back to the original control after a Layer 3 roam occurs.

D.

traffic is tunneled back to the original control after a Layer 3 roam occurs.

Answers
Suggested answer: C

Explanation:

During a Layer 3 roam in a wireless network, the client's database entry, which containsinformation such as the client's IP address, security context, and association state, is transferredfrom the original controller (where the client was first authenticated and associated) to the newcontroller (where the client has roamed to). This transfer allows the client to maintain its IPaddress and continue its session seamlessly, without needing to re-authenticate or receive anew IP address

Total 983 questions
Go to page: of 99