ExamGecko
Home / Cisco / 350-401 / List of questions
Ask Question

Cisco 350-401 Practice Test - Questions Answers, Page 65

List of questions

Question 641

Report
Export
Collapse

Which DNS lookup does an AP perform when attempting CAPWAP discovery?

CAPWAP-CONTROLLER.Iocal

CAPWAP-CONTROLLER.Iocal

CISCO-CAPWAP-CONTROLLER.Iocal

CISCO-CAPWAP-CONTROLLER.Iocal

CISCO-DNA-CONTROLLER.Iocal

CISCO-DNA-CONTROLLER.Iocal

CISCO-CONTROLLER.Iocal

CISCO-CONTROLLER.Iocal

Suggested answer: B
asked 10/10/2024
Sergio da Costa
35 questions

Question 642

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 642 115941 10102024232943000000

Why does OSPF fail to establish an adjacency between R1 and R2?

authentication mismatch

authentication mismatch

interface MTU mismatch

interface MTU mismatch

area mismatch

area mismatch

timers mismatch

timers mismatch

Suggested answer: B
asked 10/10/2024
Kaliannan K
33 questions

Question 643

Report
Export
Collapse

Which two features are available only in next-generation firewalls? (Choose two.)

virtual private network

virtual private network

deep packet inspection

deep packet inspection

stateful inspection

stateful inspection

application awareness

application awareness

packet filtering

packet filtering

Suggested answer: C, D
asked 10/10/2024
Khoi Le
39 questions

Question 644

Report
Export
Collapse

What is a benefit of using segmentation with TrustSec?

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

Packets sent between endpoints on a LAN are encrypted using symmetric key cryptography.

Firewall rules are streamlined by using business-level profiles.

Firewall rules are streamlined by using business-level profiles.

Integrity checks prevent data from being modified in transit.

Integrity checks prevent data from being modified in transit.

Security group tags enable network segmentation.

Security group tags enable network segmentation.

Suggested answer: B
asked 10/10/2024
Rajeev R Kumar
36 questions

Question 645

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 645 115944 10102024232943000000

Which configuration enables fallback to local authentication and authorization when no TACACS+ server is available?

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec default group tacacs+ local

Router(config)# aaa fallback local

Router(config)# aaa fallback local

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec FALLBACK local

Suggested answer: B
asked 10/10/2024
Jordi Nogués
37 questions

Question 646

Report
Export
Collapse

A customer has a pair of Cisco 5520 WLCs set up in an SSO cluster to manage all APs. Guest traffic is anchored to a Cisco 3504 WLC located in a DMZ. Which action is needed to ensure that the EolP tunnel remains in an UP state in the event of failover on the SSO cluster?

Configure back-to-back connectivity on the RP ports.

Configure back-to-back connectivity on the RP ports.

Enable default gateway reachability check.

Enable default gateway reachability check.

Use the same mobility domain on all WLCs.

Use the same mobility domain on all WLCs.

Use the mobility MAC when the mobility peer is configured.

Use the mobility MAC when the mobility peer is configured.

Suggested answer: B
asked 10/10/2024
Fiston LOMATE
43 questions

Question 647

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 647 115946 10102024232943000000

Extended access-list 100 is configured on interface GigabitEthernet 0/0 in an inbound direction, but it does not have the expected behavior of allowing only packets to or from 192.168.0.0/16. Which command set properly configures the access list?

R1(config)#no access-list 100 seq 10

R1(config)#access-list 100 seq 40 deny ip any any

R1(config)#no access-list 100 seq 10

R1(config)#access-list 100 seq 40 deny ip any any

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#no 10

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#no 10

R1(config)#no access-list 100 deny ip any any

R1(config)#no access-list 100 deny ip any any

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#5 permit to any any

R1(config)#ip access-list extended 100

R1(config-ext-nacl)#5 permit to any any

Suggested answer: A
asked 10/10/2024
Vladimir Kiseliov
37 questions

Question 648

Report
Export
Collapse

Refer to the exhibit.

Cisco 350-401 image Question 648 115947 10102024232943000000

What is achieved by this Python script?

It counts JSON data from a website.

It counts JSON data from a website.

It loads JSON data into an HTTP request.

It loads JSON data into an HTTP request.

It reads JSON data into a formatted list.

It reads JSON data into a formatted list.

It converts JSON data to an HTML document.

It converts JSON data to an HTML document.

Suggested answer: B
asked 10/10/2024
Robert Thompson
45 questions

Question 649

Report
Export
Collapse

Which technology enables a redundant supervisor engine to take over when the primary supervisor engine fails?

NSF

NSF

graceful restart

graceful restart

SSO

SSO

FHRP

FHRP

Suggested answer: C
asked 10/10/2024
Linda Jannina Sourander
38 questions

Question 650

Report
Export
Collapse

Which action limits the total amount of memory and CPU that is used by a collection of VMs?

Place the collection of VMs in a resource pool.

Place the collection of VMs in a resource pool.

Place the collection of VMs in a vApp.

Place the collection of VMs in a vApp.

Limit the amount of memory and CPU that is available to the cluster.

Limit the amount of memory and CPU that is available to the cluster.

Limit the amount of memory and CPU that is available to the individual VMs.

Limit the amount of memory and CPU that is available to the individual VMs.

Suggested answer: A
asked 10/10/2024
Manoj Balan
44 questions
Total 983 questions
Go to page: of 99

Related questions