Certbus > Cisco > CCNP > 350-401 > 350-401 Online Practice Questions and Answers

350-401 Online Practice Questions and Answers

Questions 4

Which description of an SD-Access wireless network infrastructure deployment is true?

A. The access point is part of the fabric underlay.

B. The WLC is part of the fabric underaly.

C. The access point is part the fabirc overlay.

D. The wireless client is part of the fabirc overlay.

Browse 1273 Q&As
Questions 5

Refer to the exhibit.

Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree port-priority 32 command on G0/1 on SW2, but the port remains blocked.

Which command should be entered on the ports that are connected to Link2 to resolve the issue?

A. Enter spanning-tree port-priority 32 on SW1.

B. Enter spanning-tree port-priority 224 on SW1.

C. Enter spanning-tree port-priority 4 on SW2.

D. Enter spanning-tree port-priority 64 on SW2.

Browse 1273 Q&As
Questions 6

High bandwidth utilization is occurring on interface Gig0/1 of a router. An engineer must identify the flows that are consuming the most bandwidth. Cisco DNA Center is used as a flow exporter and is configured with the IP address

192.168.23.1 and UDP port 23000. Which configuration must be applied to set NetFlow data export and capture on the router?

A. Option A

B. Option B

C. Option C

D. Option D

Browse 1273 Q&As
Questions 7

Which configuration feature should be used to block rogue router advertisements instead of using the IPv6 Router Advertisement Guard feature?

A. VACL blocking broadcast frames from nonauthorized hosts

B. IPv4 ACL blocking route advertisements from nonauthorized hosts

C. PVLANs with promiscuous ports associated to route advertisements and isolated ports for nodes

D. PVLANs with community ports associated to route advertisements and isolated ports for nodes

Browse 1273 Q&As
Questions 8

Which function does a Cisco SD-Access extended node perform?

A. provides fabric extension to nonfabric devices through remote registration and configuration

B. performs tunneling between fabric and nonfabric devices to route traffic over unknown networks

C. used to extend the fabric connecting to downstream nonfabric enabled Layer 2 switches

D. in charge of establishing Layer 3 adjacencies with nonfabric unmanaged node

Browse 1273 Q&As
Questions 9

A customer has a wireless network deployed within a multi-tenant building. The network provides client access, location-based services, and is monitored using Cisco DNA Center. The security department wants to locate and track malicious devices based on threat signatures.

Which feature is required for this solution?

A. Cisco aWIPS policies on the WLC

B. Cisco aWIPS policies on Cisco DNA Center

C. malicious rogue rules on the WLC

D. malicious rogue rules on Cisco DNA Center

Browse 1273 Q&As
Questions 10

Refer to the exhibit.

A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec profiles. Which two configuration changes accomplish this? (Choose two).

A. Create an IPsec profile, associate the transform-set ACL, and apply the profile to the tunnel interface.

B. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec ipv4.

C. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.

D. Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

E. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to 10.20.0.0/24.

Browse 1273 Q&As
Questions 11

What is an advantage of utilizing data models in a multivendor environment?

A. lowering CPU load incurred to managed devices

B. improving communication security with binary encoded protocols

C. facilitating a unified approach to configuration and management

D. removing the distinction between configuration and runtime state data

Browse 1273 Q&As
Questions 12

Refer to the exhibit. Which command set must be applied on R1 to establish a BGP neighborship with R2 and to allow communication from R1 to reach the networks?

A. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1201

B. router bgp 1200 network 209.165.201.0 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1201

C. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.202.130 remote-as 1200

D. router bgp 1200 network 209.165.200.224 mask 255.255.255.224 neighbor 209.165.201.2 remote-as 1200

Browse 1273 Q&As
Questions 13

Which two actions are recommended as security best practice to protect REST API (Choose two)

A. Use TACACACS+ authentication

B. Enable dual authentication of the session

C. Enable out-of band authentication

D. Use SSL for encryption

E. Use a password hash

Browse 1273 Q&As
Questions 14

Refer to the exhibit. An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume tliat all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task?

A. R4(config)#route-map PREPEND permit 10 R4(config-route-map)#set as-path prepend 200 200 200 R4(config)#router bgp 200 R4(conflg-router)#neighbor 10.2.2.2 route-map PREPEND out

B. R3(config)#route-map PREPEND permit 10 R3(config-route-map)#set as-path prepend 200 200 200 R3(config)#router bgp 200 R3(conflg-router)#neighbor 10.1.1.1 route-map PREPEND out

C. R4(config)#route-map PREPEND permit 10 R4(config-route-map)#set as-path prepend 100 100 100 R4(config)#router bgp 200 R4(config-router)#neighbor 10.2.2.2 route-map PREPEND in

D. R3(config)#route-map PREPEND permit 10 R3(config-route-map)#set as-path prepend 100 100 100 R3(config)#router bgp 200 R3(config-router)#neighbor 10.2.2.2 route-map PREPEND in

Browse 1273 Q&As
Questions 15

An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSRP router

The peer router has been configured using the default priority value.

Which three commands are required? (Choose three.)

A. standby 300 timers 1 110

B. standby 300 priority 90

C. standby 300 priority 110

D. standby version 2

E. standby 300 preempt

F. standby version 1

Browse 1273 Q&As
Questions 16

Which two components are supported by LISP? (choose two )

A. proxy ETR

B. egress tunnel router

C. route reflector

D. HMAC algorithm

E. spoke

Browse 1273 Q&As
Questions 17

Based on the output below, which Python code shows the value of the "upTime" key?

A. json_data = response.json() print(json_data['response'][0]['upTime'])

B. json_data = response.json()

print(json_data[response][0][upTime])

C. json_data = json.loads(response.text) print(json_data['response']['family']['upTime'])

D. json_data = response.json() print(json_data['response'][family]['upTime'])

Browse 1273 Q&As
Questions 18

DRAG DROP

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Select and Place:

Browse 1273 Q&As
Exam Code: 350-401
Exam Name: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) & CCIE Enterprise Infrastructure & CCIE Enterprise Wireless
Last Update: Apr 15, 2024
Questions: 1273 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99