Braindumpstudy: Braindumpstudy Exam Dumps, High Pass Rate!
Braindumpstudy: Braindumpstudy Exam Dumps, High Pass Rate!
http://www.braindumpstudy.com
BraindumpStudy Exam Dumps, High Pass Rate!
350-401 study guide & real 350-401 braindumps - latest valid
IT Certification Guaranteed, The Easy Way!
Exam : 350-401
Vendor : Cisco
Version : DEMO
NO.1 When a wireless client roams between two different wireless controllers, a network
connectivity outage is experience for a period of time. Which configuration issue would cause this
problem?
A. All of the controllers within the mobility group are using the same virtual interface IP address.
B. Not all of the controllers in the mobility group are using the same mobility group name.
C. Not all of the controllers within the mobility group are using the same virtual interface IP address.
D. All of the controllers in the mobility group are using the same mobility group name.
Answer: C
NO.2 Refer to the exhibit How was spanning-tree configured on this interface?
A. By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface
configuration mode
B. By entering the command spanning-tree portfast in the interface configuration mode
C. By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode
D. By entering the command spanning-tree portfast trunk in the interface configuration mode.
Answer: D
NO.3 Refer to the exhibit. An engineer implemented several configuration changes and receives the
logging message on switch1. Which action should the engineer take to resolve this issue?
A. Change Switch1 to switch port mode dynamic desirable
B. Change the VTP domain to match on both switches
C. Change Switch2 to switch port mode dynamic auto
D. Change Switch1 to switch port mode dynamic auto
Answer: B
Which action resolves the EtherChannel issue between SW2 and SW3?
A. Configure channel-group 1 mode desirable on both interfaces.
B. Configure switchport mode trunk on SW2.
C. Configure channel-group 1 mode active on both interfaces.
D. Configure switchport nonegotiate on SW3
Answer: C
A. Option C
B. Option A
C. Option B
D. Option D
Answer: D
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP
address of 192.168.1.200?
A. ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customerl ip route vrf Customer
192.168.1.200 255.255.255.255 192.168.1.1 Customer2
B. ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 global
ip route vrf Customer 192.168.1.200 255.255.255.255 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 VlanlO
ip route 172.16.1.0 255.255.255.0 Vlan20
C. ip route vrf Customerl 172.16.1.1 255.255.255.255 172.16.1.1 global
ip route vrf Customer 192.168.1.200 255.255.255.0 192.168.1.1 global
ip route 192.168.1.0 255.255.255.0 VlanlO
ip route 172.16.1.0 255.255.255.0 Vlan20
D. ip route vrf Customerl 172.16.1.0 255.255.255.0 172.16.1.1 Customer2 ip route vrf Customer
192.168.1.200 255.255.255.255 192.168.1.1 Customerl
Answer: B
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24.
The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0
interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet.
Which explanation of this behavior is true?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is
sourced from the router.
B. Only standard access control lists can block traffic from a source IP address.
C. The access control list must contain an explicit deny to block traffic from the router.
D. After an access control list is applied to an interface, that interface must be shut and no shut for
the access control list to take effect.
Answer: A
NO.11 Drag and drop the DHCP messages that are exchanged between a client and an AP into the
order they are exchanged on the right.
Answer:
There are four messages sent between the DHCP Client and DHCP Server: DHCPDISCOVER,
DHCPOFFER, DHCPREQUEST and DHCPACKNOWLEDGEMENT.
This process is often abbreviated as DORA (for Discover, Offer, Request, Acknowledgement).
NO.12 What is the purpose of the LISP routing and addressing architecture?
A. It creates two entries for each network node, one for Its identity and another for its location on
the network.
B. It allows multiple Instances of a routing table to co-exist within the same router.
C. It allows LISP to be applied as a network visualization overlay though encapsulation.
D. It creates head-end replication used to deliver broadcast and multicast frames to the entire
network.
Answer: A
Which command when applied to the Atlanta router reduces type 3 LSA flooding into the backbone
NO.14 Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
B)
C)
D)
A. Option C
B. Option D
C. Option B
D. Option A
Answer: A
CoPP protects the route processor on network devices by treating route processor resources as a
separate entity with its own ingress interface (and in some implementations, egress also). CoPP is
used to police traffic that is destined to the route processor of the router such as:
+ routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.
Therefore we must apply the CoPP to deal with SSH because it is in the
management plane. CoPP must be put under "control-plane" command.
NO.15 Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command
to verify the ISAKMP SA status. What does the status show?
A. VPN peers agreed on parameters for the ISAKMP SA
B. ISAKMP SA is authenticated and can be used for Quick Mode.
C. ISAKMP SA has been created, but it has not continued to form.
MTU has been configured on the underlying physical topology, and no MTU command has been
configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE
tunnel from host X to host Y, assuming the DF bit is cleared?
A. The packet arrives on router C fragmented.
B. The packet is discarded on router B
C. The packet is discarded on router A
D. The packet arrives on router C without fragmentation.
Answer: A
NO.18 Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface
GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?
A. Option D
B. Option C
C. Option B
D. Option A
Answer: A
The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the
interface and bring it back up when there is a problem with the IP SLA.
Which configuration should the engineer use?
A. event manager applet EEM_IP_SLA
event track 10 state unreachable
B. event manager applet EEM_IP_SLA
event sla 10 state unreachable
C. event manager applet EEM_IP_SLA
event track 10 state down