ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 25

List of questions

Question 241

Report
Export
Collapse

An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

Use Cisco AMP deployment with the Exploit Prevention engine enabled.

Use Cisco Firepower and block traffic to TOR networks.

Use Cisco Firepower and block traffic to TOR networks.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation.

Suggested answer: B
asked 10/10/2024
RODRIGO BALISTA
40 questions

Question 242

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 242 115541 10102024232942000000

Which code results in the working Python script displaying a list of network devices from the Cisco DNA Center?

Cisco 350-401 image Question 242 115541 10102024232942000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: B
asked 10/10/2024
Vojtech Danek
38 questions

Question 243

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 243 115542 10102024232942000000

What step resolves the authentication issue?

use basic authentication

use basic authentication

change the port to 12446

change the port to 12446

target 192 168 100 82 in the URI

target 192 168 100 82 in the URI

restart the vsmart host

restart the vsmart host

Suggested answer: B

Explanation:


asked 10/10/2024
Manuela Kays
36 questions

Question 244

Report
Export
Collapse

What is required for a virtual machine to run?

a Type 1 hypervisor and a host operating system

a Type 1 hypervisor and a host operating system

a hypervisor and physical server hardware

a hypervisor and physical server hardware

only a Type 1 hypervisor

only a Type 1 hypervisor

only a Type 2 hypervisor

only a Type 2 hypervisor

Suggested answer: B
asked 10/10/2024
Henry R L Thom
35 questions

Question 245

Report
Export
Collapse

What is required for intercontroller Layer 3 roaming?

Mobility groups are established between wireless controllers.

Mobility groups are established between wireless controllers.

The management VLAN is present as a dynamic VLAN on the second WLC.

The management VLAN is present as a dynamic VLAN on the second WLC.

WLCs use separate DHCP servers.

WLCs use separate DHCP servers.

WLCs have the same IP addresses configured on their interfaces.

WLCs have the same IP addresses configured on their interfaces.

Suggested answer: D
asked 10/10/2024
Penny Chang
47 questions

Question 246

Report
Export
Collapse

An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group. Which command set is required to complete this task?

interface GigabitEthernet0/1 ip address 10.10.10.2 255.255.255.0 vrrp 115 ip 10.10.10.1 vrrp 115 authentication 407441579

Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt

Router(config if)# vrrp 115 track 1 decrement 100 Router(config-if)# vrrp 115 preempt

Router(config-if)# vrrp 115 priority 100

Router(config-if)# vrrp 115 priority 100

Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt

Router(config-if)# vrrp 115 track 1 decrement 10 Router(config-if)# vrrp 115 preempt

Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt

Router(config-if)# standby 115 priority 100 Router(config-if)# standby 115 preempt

Suggested answer: B
asked 10/10/2024
Roger Wehrli
35 questions

Question 247

Report
Export
Collapse

An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)

Cisco 350-401 image Question 247 115546 10102024232942000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Option E

Option E

Suggested answer: C, D
asked 10/10/2024
Zakarya Doqa
23 questions

Question 248

Report
Export
Collapse

What is a benefit of Type 1 hypervisors?

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Suggested answer: B
asked 10/10/2024
Robeena Meer
35 questions

Question 249

Report
Export
Collapse

What is the wireless received signal strength indicator?

The value given to the strength of the wireless signal received compared to the noise level

The value given to the strength of the wireless signal received compared to the noise level

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

The value of how strong the wireless signal Is leaving the antenna using transmit power, cable loss, and antenna gain

The value of how much wireless signal is lost over a defined amount of distance

The value of how much wireless signal is lost over a defined amount of distance

The value of how strong a tireless signal is receded, measured in dBm

The value of how strong a tireless signal is receded, measured in dBm

Suggested answer: D

Explanation:

RSSI, or "Received Signal Strength Indicator," is a measurement of how well your device can hear a signal from an access point or router. It's a value that is useful for determining if you have enough signal to get a good wireless connection.

This value is measured in decibels (dBm) from 0 (zero) to -120 (minus 120). The closer to 0 (zero) the stronger the signal is which means it's better, typically voice networks require a -65db or better signal level while a data network needs - 80db or better.

asked 10/10/2024
Reza Mirabrishami
39 questions

Question 250

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 250 115549 10102024232942000000

After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2.

09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/0, putting Gi0/0 in err-disable state

09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/1, putting Gi0/1 in err-disable state

Based on the output from SW1 and the log message received on Switch SW2, what action should the engineer take to resolve this issue?

Configure the same protocol on the EtherChannel on switch SW1 and SW2.

Configure the same protocol on the EtherChannel on switch SW1 and SW2.

Connect the configuration error on interface Gi0/1 on switch SW1.

Connect the configuration error on interface Gi0/1 on switch SW1.

Define the correct port members on the EtherChannel on switch SW1.

Define the correct port members on the EtherChannel on switch SW1.

Correct the configuration error on interface Gi0/0 switch SW1.

Correct the configuration error on interface Gi0/0 switch SW1.

Suggested answer: A

Explanation:

In this case, we are using your EtherChannel without a negotiation protocol. As a result, if the opposite switch is not also configured for EtherChannel operation on the respective ports, there is a danger of a switching loop. The EtherChannel

Misconfiguration Guard tries to prevent that loop from occuring by disabling all the ports bundled in the EtherChannel.

asked 10/10/2024
Yedron Rojas Acosta
49 questions
Total 983 questions
Go to page: of 99

Related questions