Cisco 350-401 Practice Test - Questions Answers, Page 94
Related questions
Which technology provides an overlay fabric 10 connect remote locations utilizing commodity data paths and improves network performance boosts security, and reduces costs?
VTEP
SD-WAN
InfiniBand
VXLAN
Refer to the exhibit.
Which configuration must be added to enable remote access only using SSHv1 or SSHv2 to this router?
A)
B)
C)
D)
Option A
Option B
Option C
Option D
Which type of antenna is designed to provide a 360-degree radiation pattern?
Yagi
directional
omnidirectional
patch
Which action is the vSmart controller responsible for in a Cisco SO-WAN deployment?
gather telemetry data from WAN Edge routes
manage, maintain, and gather configuration and status for nodes within me SD-WAN fabric
onboard WAN Edge nodes into the SD-WAN fabric
distribute security information for tunnel establishment between WAN Edge routers
Which JSON script is properly formatted?
A)
B)
C)
D)
Option A
Option B
Option C
Option D
What does the Cisco WLC Layer 3 roaming feature allow clients to do?
maintain their IP address when roaming to an AP 01 controller with a different client VLAN assignment
maintain their connection between APs even when the AP management VLANs arc different
roam seamlessly between controllers even when the controller management VLANs are different
maintain their connection even if the client IP address changes when roaming
Refer to the exhibit.
Which command required to validate that an IP SLA configuration matches the traffic between the branch office and the central site?
R1# show ip sla configuration
R1# show Ip sla group schedule
R1# show Ip route
R1# show ip sla statistics
Which security option protects credentials train snifter attacks in a basic API authentication?
TLS of SSL for communication
next-generation firewall
VPN connection between client and server
AAA services to authenticate the API
Refer to the Exhibit.
Refer to the exhibit. An engineer must configure a Cisco WLC with WPA2 Enterprise mode and avoid global server lists. Which action is required?
Apply CISCO ISE default settings.
Disable the RADIUS server accounting interim update.
Select a RADIUS authentication server.
Enable EAP parameters.
Which two security mechanisms aie used by Cisco Threat Defense to gain visibility into the most dangerous cyber threats? (Choose two.)
Traffic Telemetry
VLAN segmentation
virtual private networks
dynamic enforce policy
file reputation
Question