350-401 by Marlon
350-401 by Marlon
350-401 by Marlon
Cisco
Exam Questions 350-401
Implementing and Operating Cisco Enterprise Network Core Technologies
NEW QUESTION 1
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with
two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
A. 1
B. 2
C. 4
D. 8
Answer: B
NEW QUESTION 2
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the
outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which
A. Mastered
B. Not Mastered
Answer: A
Explanation:
of this behavior is true?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
B. Only standard access control lists can block traffic from a source IP address.
C. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
D. The access control list must contain an explicit deny to block traffic from the router.
Answer: A
NEW QUESTION 3
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
Answer: DE
NEW QUESTION 4
Which statement about agent-based versus agentless configuration management tools is true?
Answer: D
NEW QUESTION 5
Which protocol does REST API rely on to secure the communication channel?
A. TCP
B. HTTPS
C. SSH
D. HTTP
Answer: B
NEW QUESTION 6
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?
A. LISP
B. IS-IS
C. Cisco TrustSec
D. VXLAN
Answer: D
NEW QUESTION 7
Which PAgP mode combination prevents an Etherchannel from forming?
A. auto/auto
B. desirable/desirable
C. auto/desirable
D. desirable
Answer: A
NEW QUESTION 8
Which statement about Cisco Express Forwarding is true?
Answer: B
NEW QUESTION 9
Which two mechanisms are available to secure NTP? (Choose two.)
A. IP prefix list-based
B. IPsec
C. TACACS-based authentication
D. IP access list-based
E. Encrypted authentication
Answer: DE
NEW QUESTION 10
Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor?
A. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.
B. Type 1 hypervisor enables other operating systems to run on it.
C. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, andnetwork resources.
D. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.
Answer: A
NEW QUESTION 10
Which statement about a fabric access point is true?
Answer: C
NEW QUESTION 12
Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
On premise: customizable,specific requirements,resources Cloud: scale, built-in automated backup, strong stable internet
NEW QUESTION 17
Which OSPF networks types are compatible and allow communication through the two peering devices?
A. broadcast to nonbroadcast
B. point-to-multipoint to nonbroadcast
C. broadcast to point-to-point
D. point-to-multipoint to broadcast
Answer: B
NEW QUESTION 22
Which method does the enable secret password option use to encrypt device passwords?
A. AES
B. CHAP
C. PAP
D. MD5
Answer: D
NEW QUESTION 25
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command
ensures that SW3 receives frames only from VLAN 50?
Answer: A
NEW QUESTION 27
What the role of a fusion in an SD-Access solution?
Answer: C
NEW QUESTION 31
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
A. CISCO-DNA-CONTROLLER local
B. CAPWAP-CONTROLLER local
C. CISCO-CONTROLLER local
D. CISCO-CAPWAP-CONTROLLER local
Answer: D
NEW QUESTION 33
What is a benefit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the device operating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
Answer: D
NEW QUESTION 34
Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?
A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
C. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
Answer: A
NEW QUESTION 37
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
A. MTU
B. Window size
C. MRU
D. MSS
Answer: D
NEW QUESTION 41
Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. Permit 10.0.0.0.0.0.0.1
B. Permit 10.0.0.1.0.0.0.0
C. Permit 10.0.0.1.0.0.0.254
D. Permit 10.0.0.0.255.255.255.254
Answer: C
NEW QUESTION 44
What do Cisco DNA southbound APIs provide?
Answer: A
NEW QUESTION 45
Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of
roaming is supported?
A. Indirect
B. Layer 3 intercontroller
C. Layer 2 intercontroller
D. Intracontroller
Answer: B
NEW QUESTION 49
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this
requirement?
A. Autonomous
B. Mobility Express
C. SD-Access wireless
D. Local mode
Answer: B
NEW QUESTION 52
Which action is the vSmart controller responsible for in an SD-WAN deployment?
Answer: B
NEW QUESTION 53
Which feature must be configured to allow packet capture over Layer 3 infrastructure'?
A. VSPAN
B. IPSPAN
C. RSPAN
D. ERSPAN
Answer: D
NEW QUESTION 56
What is the difference between the enable password and the enable secret password when service password encryption is enable on an IOS device?
Answer: D
NEW QUESTION 59
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
Answer: C
NEW QUESTION 61
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers
through BGP?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
NEW QUESTION 65
Which two protocols are used with YANG data models? (Choose two.)
A. HTTPS
B. SSH
C. RESTCONF
D. TLS
E. NFTCONF
Answer: CE
NEW QUESTION 68
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the
outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing
traffic flows?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 73
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command
meets this requirement?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
NEW QUESTION 74
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
A. text string
B. username and password
C. certificate
D. RADIUS token
Answer: A
NEW QUESTION 79
Which feature is supported by ElGRP but is not supported by OSPF?
A. route summarization
B. equal-cost load balancing
C. unequal-cost load balancing
D. route filtering
Answer: C
NEW QUESTION 83
What are two benefits of virtualizing the server with the use of VMs in data center environment? (Choose two.)
A. Increased security
B. reduced rack space, power, and cooling requirements
C. reduced IP and MAC address requirements
D. speedy deployment
E. smaller Layer 2 domain
Answer: BD
NEW QUESTION 87
Which requirement for an Ansible-managed node is true?
Answer: A
NEW QUESTION 91
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
A. ETR
B. MS
C. ITR
D. MR
Answer: A
NEW QUESTION 95
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Answer: B
NEW QUESTION 97
What does this EEM applet event accomplish?
"event snmp oid 1.3.6.1.3.7.1.5.1.2.4.2.9 get-type next entry-op g entry-val 75 poll-interval 5"
A. It issues email when the value is greater than 75% for five polling cycles.
B. It reads an SNMP variable, and when the value exceeds 75% for live polling cycles.
C. It presents a SNMP variable that can be interrogated.
D. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.
Answer: B
NEW QUESTION 99
What are two common sources of interference for WI-FI networks? (Choose two.)
A. radar
B. LED lights
C. rogue AP
D. conventional oven
E. fire alarm
Answer: AC
About Exambible
Found in 1998
Exambible is a company specialized on providing high quality IT exam practice study materials, especially Cisco CCNA, CCDA,
CCNP, CCIE, Checkpoint CCSE, CompTIA A+, Network+ certification practice exams and so on. We guarantee that the
candidates will not only pass any IT exam at the first attempt but also get profound understanding about the certificates they have
got. There are so many alike companies in this industry, however, Exambible has its unique advantages that other companies could
not achieve.
Our Advances
* 99.9% Uptime
All examinations will be up to date.
* 24/7 Quality Support
We will provide service round the clock.
* 100% Pass Rate
Our guarantee that you will pass the exam.
* Unique Gurantee
If you do not pass the exam at the first time, we will not only arrange FULL REFUND for you, but also provide you another
exam of your claim, ABSOLUTELY FREE!
NEW QUESTION 1
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management is already 100% IPV6 enabled. In a dual-stack network with
two dual-stack NetFlow collections, how many flow exporters are needed per network device in the flexible NetFlow configuration?
A. 1
B. 2
C. 4
D. 8
Answer: B
NEW QUESTION 2
Refer to the exhibit.
An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the
outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which
A. Mastered
B. Not Mastered
Answer: A
Explanation:
of this behavior is true?
A. Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.
B. Only standard access control lists can block traffic from a source IP address.
C. After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.
D. The access control list must contain an explicit deny to block traffic from the router.
Answer: A
NEW QUESTION 3
Which two steps are required for a complete Cisco DNA Center upgrade? (Choose two.)
Answer: DE
NEW QUESTION 4
Which statement about agent-based versus agentless configuration management tools is true?
Answer: D
NEW QUESTION 5
Which protocol does REST API rely on to secure the communication channel?
A. TCP
B. HTTPS
C. SSH
D. HTTP
Answer: B
NEW QUESTION 6
On which protocol or technology is the fabric data plane based in Cisco SD-Access fabric?
A. LISP
B. IS-IS
C. Cisco TrustSec
D. VXLAN
Answer: D
NEW QUESTION 7
Which PAgP mode combination prevents an Etherchannel from forming?
A. auto/auto
B. desirable/desirable
C. auto/desirable
D. desirable
Answer: A
NEW QUESTION 8
Which statement about Cisco Express Forwarding is true?
Answer: B
NEW QUESTION 9
Which two mechanisms are available to secure NTP? (Choose two.)
A. IP prefix list-based
B. IPsec
C. TACACS-based authentication
D. IP access list-based
E. Encrypted authentication
Answer: DE
NEW QUESTION 10
Which statement explains why Type 1 hypervisor is considered more efficient than Type 2 hypervisor?
A. Type 1 hypervisor runs directly on the physical hardware of the host machine without relying on the underlying OS.
B. Type 1 hypervisor enables other operating systems to run on it.
C. Type 1 hypervisor relics on the existing OS of the host machine to access CPU, memory, storage, andnetwork resources.
D. Type 1 hypervisor is the only type of hypervisor that supports hardware acceleration techniques.
Answer: A
NEW QUESTION 10
Which statement about a fabric access point is true?
Answer: C
NEW QUESTION 12
Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right.
A. Mastered
B. Not Mastered
Answer: A
Explanation:
On premise: customizable,specific requirements,resources Cloud: scale, built-in automated backup, strong stable internet
NEW QUESTION 17
Which OSPF networks types are compatible and allow communication through the two peering devices?
A. broadcast to nonbroadcast
B. point-to-multipoint to nonbroadcast
C. broadcast to point-to-point
D. point-to-multipoint to broadcast
Answer: B
NEW QUESTION 22
Which method does the enable secret password option use to encrypt device passwords?
A. AES
B. CHAP
C. PAP
D. MD5
Answer: D
NEW QUESTION 25
Refer to exhibit.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server Which command
ensures that SW3 receives frames only from VLAN 50?
Answer: A
NEW QUESTION 27
What the role of a fusion in an SD-Access solution?
Answer: C
NEW QUESTION 31
Which DNS lookup does an access point perform when attempting CAPWAP discovery?
A. CISCO-DNA-CONTROLLER local
B. CAPWAP-CONTROLLER local
C. CISCO-CONTROLLER local
D. CISCO-CAPWAP-CONTROLLER local
Answer: D
NEW QUESTION 33
What is a benefit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the device operating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and consistency.
Answer: D
NEW QUESTION 34
Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?
A. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.
B. Each virtual machine requires a unique IP address but shares the MAC address with the physical server
C. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.
D. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.
Answer: A
NEW QUESTION 37
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
A. MTU
B. Window size
C. MRU
D. MSS
Answer: D
NEW QUESTION 41
Which standard access control entry permits from odd-numbered hosts in the 10.0.0.0/24 subnet?
A. Permit 10.0.0.0.0.0.0.1
B. Permit 10.0.0.1.0.0.0.0
C. Permit 10.0.0.1.0.0.0.254
D. Permit 10.0.0.0.255.255.255.254
Answer: C
NEW QUESTION 44
What do Cisco DNA southbound APIs provide?
Answer: A
NEW QUESTION 45
Refer to the exhibit.
The WLC administrator sees that the controller to which a roaming client associates has Mobility Role Anchor configured under Clients > Detail. Which type of
roaming is supported?
A. Indirect
B. Layer 3 intercontroller
C. Layer 2 intercontroller
D. Intracontroller
Answer: B
NEW QUESTION 49
A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this
requirement?
A. Autonomous
B. Mobility Express
C. SD-Access wireless
D. Local mode
Answer: B
NEW QUESTION 52
Which action is the vSmart controller responsible for in an SD-WAN deployment?
Answer: B
NEW QUESTION 53
Which feature must be configured to allow packet capture over Layer 3 infrastructure'?
A. VSPAN
B. IPSPAN
C. RSPAN
D. ERSPAN
Answer: D
NEW QUESTION 56
What is the difference between the enable password and the enable secret password when service password encryption is enable on an IOS device?
Answer: D
NEW QUESTION 59
How does Cisco Trustsec enable more flexible access controls for dynamic networking environments and data centers?
Answer: C
NEW QUESTION 61
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers
through BGP?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: A
NEW QUESTION 65
Which two protocols are used with YANG data models? (Choose two.)
A. HTTPS
B. SSH
C. RESTCONF
D. TLS
E. NFTCONF
Answer: CE
NEW QUESTION 68
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to 10.1.2.0/24. The access control list is applied in the
outbound direction on router interface GigabitEthemet 0/1. Which configuration commands can the engineer use to allow this traffic without disrupting existing
traffic flows?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: B
NEW QUESTION 73
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command
meets this requirement?
A)
B)
C)
D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D
NEW QUESTION 74
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
A. text string
B. username and password
C. certificate
D. RADIUS token
Answer: A
NEW QUESTION 79
Which feature is supported by ElGRP but is not supported by OSPF?
A. route summarization
B. equal-cost load balancing
C. unequal-cost load balancing
D. route filtering
Answer: C
NEW QUESTION 83
What are two benefits of virtualizing the server with the use of VMs in data center environment? (Choose two.)
A. Increased security
B. reduced rack space, power, and cooling requirements
C. reduced IP and MAC address requirements
D. speedy deployment
E. smaller Layer 2 domain
Answer: BD
NEW QUESTION 87
Which requirement for an Ansible-managed node is true?
Answer: A
NEW QUESTION 91
Which LISP device is responsible for publishing EID-to-RLOC mappings for a site?
A. ETR
B. MS
C. ITR
D. MR
Answer: A
NEW QUESTION 95
Refer to the exhibit.
Which HTTP JSON response does the python code output give?
Answer: B
NEW QUESTION 97
What does this EEM applet event accomplish?
"event snmp oid 1.3.6.1.3.7.1.5.1.2.4.2.9 get-type next entry-op g entry-val 75 poll-interval 5"
A. It issues email when the value is greater than 75% for five polling cycles.
B. It reads an SNMP variable, and when the value exceeds 75% for live polling cycles.
C. It presents a SNMP variable that can be interrogated.
D. Upon the value reaching 75%, a SNMP event is generated and sent to the trap server.
Answer: B
NEW QUESTION 99
What are two common sources of interference for WI-FI networks? (Choose two.)
A. radar
B. LED lights
C. rogue AP
D. conventional oven
E. fire alarm
Answer: AC
Relate Links
https://www.exambible.com/350-401-exam/
Contact us
We are proud of our high-quality customer service, which serves you around the clock 24/7.
Viste - https://www.exambible.com/