You are on page 1of 33

Cisco.350-401.v2022-03-16.

q75

Exam Code: 350-401


Implementing Cisco Enterprise Network Core Technologies (350-401
Exam Name:
ENCOR)
Certification
Cisco
Provider:
Free Question
75
Number:
Version: v2022-03-16
# of views: 144
# of Questions views: 792
https://www.freecram.net/torrent/Cisco.350-401.v2022-03-16.q75.html

NEW QUESTION: 1
Which function in handled by vManage in the cisco SD-WAN fabric?
A. Establishes BFD sessions to test liveliness of links and nodes.
B. Performs remote software upgrades for WAN Edge vSmart and vBond.
C. Establishes iPsec tunnels with nodes
D. Distributes polices that govern data forwarding.
Answer: B (LEAVE A REPLY)

NEW QUESTION: 2
Refer to the exhibit. Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2.
When two actions from the initial value of the TTL? (Choose two.)
A. The packet reaches R2 and the TTL expires
B. The packet reaches R3, and the TTL expires
C. R3 replies with a TTL exceeded message.
D. The packet reaches R1 and the TTL expires.
E. R1 replies with a TTL exceeded message
F. R2 replies with a TTL exceeded message
Answer: (SHOW ANSWER)

NEW QUESTION: 3
Which statement about TLS is accurate when using RESTCONF to write configurations on network
devices?
A. It requires certificates for authentication
B. It is used for HTTP and HTTPS requests
C. It is provided using NGINX acting as a proxy web server
D. It is not supported on Cisco devices
Answer: (SHOW ANSWER)

NEW QUESTION: 4
Which exhibit displays a valid JSON file?

A. Option A
B. Option B
C. Option D
D. Option C
Answer: (SHOW ANSWER)

NEW QUESTION: 5
When using TLS for syslog, which configuration allows for secure and reliable transportation of
messages to its default port?
A. logging host 10.2.3.4 vrf mgmt transport tcp port 6514
B. logging host 10.2.3.4 vrf mgmt transport udp port 6514
C. logging host 10.2.3.4 vrf mgmt transport tcp port 514
D. logging host 10.2.3.4 vrf mgmt transport udp port 514
Answer: (SHOW ANSWER)
The TCP port 6514 has been allocated as the default port for syslog over Transport Layer Security
(TLS).
NEW QUESTION: 6
What is the recommended MTU size for a Cisco SD-Access Fabric?
A. 1500
B. 4464
C. 17914
D. 9100
Answer: (SHOW ANSWER)

NEW QUESTION: 7
Which JSON syntax is valid?
A)

B)

C)

D)

A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
This JSON can be written as follows:
{
'switch': {
'name': 'dist1',
'interfaces': ['gig1', 'gig2', 'gig3']
}
}

NEW QUESTION: 8
What is a characteristic of a virtual machine?
A. It relies on hypervisors to allocate computing resources for it
B. It must be aware of other virtual machines, in order to allocate physical resources for them
C. It must run the same operating system as its host
D. It is deployable without a hypervisor to host it
Answer: (SHOW ANSWER)
NEW QUESTION: 9
How cloud deployments differ from on-prem deployments?
A. Cloud deployments require longer implementation times than on-premises deployments
B. Cloud deployments require less frequent upgrades than on-premises deployments.
C. Cloud deployments are more customizable than on-premises deployments.
D. Cloud deployments have lower upfront costs than on-premises deployments.
Answer: (SHOW ANSWER)

NEW QUESTION: 10
Drag and drop the characteristics from the left onto the routing protocols they describe on the right.

Answer:

NEW QUESTION: 11
Refer to the exhibit. What does the error message relay to the administrator who is trying to
configure a Cisco IOS device?
A. A NETCONF request was made for a data model that does not exist.
B. The device received a valid NETCONF request and serviced it without error.
C. A NETCONF message with valid content based on the YANG data models was made, but the
request failed.
D. The NETCONF running datastore is currently locked.
Answer: A (LEAVE A REPLY)
NEW QUESTION: 12
Which two operations are valid for RESTCONF? (Choose two.)
A. HEAD
B. REMOVE
C. PULL
D. PATCH
E. ADD
F. PUSH
Answer: (SHOW ANSWER)
RESTCONF operations include OPTIONS, HEAD, GET, POST, PATCH, DELETE.

NEW QUESTION: 13
How does Cisco Trustsec enable more access controls for dynamic networking environments and
data centers?
A. uses flexible NetFlow
B. classifies traffic based on the contextual identity of the endpoint rather than its IP address correct
C. classifies traffic based on advanced application recognition
D. assigns a VLAN to the endpoint
Answer: (SHOW ANSWER)

NEW QUESTION: 14
What is the function of a VTEP in VXLAN?
A. dynamically discover the location of end hosts in a VXLAN fabric
B. statically point to end host locations of the VXLAN fabric
C. encapsulate and de-encapsulate traffic into and out of the VXLAN fabric
D. provide the routing underlay and overlay for VXLAN headers
Answer: (SHOW ANSWER)

NEW QUESTION: 15
Refer to the exhibit.
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2
take over the forwarding role. Which command on router1 causes it to take over the forwarding role
when it return to service?
A. standby 2 track
B. standby 2 priority
C. standby 2 timers
D. standby 2 preempt
Answer: D (LEAVE A REPLY)

NEW QUESTION: 16
Refer to the exhibit How was spanning-tree configured on this interface?
A. By entering the command spanning-tree portfast trunk in the interface configuration mode.
B. By entering the command spanning-tree portfast in the interface configuration mode
C. By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode
D. By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface
configuration mode
Answer: (SHOW ANSWER)

Valid 350-401 Dumps shared by Fast2test.com for Helping Passing 350-401 Exam!
Fast2test.com now offer the newest 350-401 exam dumps, the Fast2test.com 350-401 exam
questions have been updated and answers have been corrected get the newest
Fast2test.com 350-401 dumps with Test Engine here: https://www.fast2test.com/350-401-
premium-file.html (442 Q&As Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 17
Refer to the exhibit.
A network engineer must simplify the IPsec configuration by enabling IPsec over GRE using IPsec
profiles. Which two configuration changes accomplish this? (Choose two).
A. Create an IPsec profile, associate the transform-set ACL. and apply the profile to the tunnel
interface
B. Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL |>]
C. Create an IPsec profile, associate the transform-set. and apply the profile to the tunnel interface.
D. Remove the crypto map and modify the ACL to allow traffic between 10.10.0.0/24 to
10.20.0.0/24.
E. Apply the crypto map to the tunnel interface and change the tunnel mode to tunnel mode ipsec
ipv4.
Answer: (SHOW ANSWER)

NEW QUESTION: 18
Refer to the exhibit. Which configuration must be applied to R to enable R to reach the server at
172.16.0.1?
A)
B)

C)

D)

A. Option C
B. Option B
C. Option A
D. Option D
Answer: (SHOW ANSWER)

NEW QUESTION: 19
Refer to the exhibit.
SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic
from the Finance VLAN traverse this switch Which command meets this requirement?
A)

B)

C)

D)
A. Option D
B. Option A
C. Option C
D. Option B
Answer: (SHOW ANSWER)

NEW QUESTION: 20

A. set a NAC state


B. utilize RADIUS profiling
C. require a DHCP address assignment
D. enable AAA override
Answer: (SHOW ANSWER)

NEW QUESTION: 21
Refer to the exhibit. An engineer must create a script that appends the output of the show process
cpu sorted command to a file.
A. action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"
B. action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"
C. action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"
D. action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"
Answer: (SHOW ANSWER)

NEW QUESTION: 22
Which device makes the decision for a wireless client to roam?
A. wireless client
B. access point
C. WCS location server
D. wireless LAN controller
Answer: (SHOW ANSWER)

NEW QUESTION: 23
What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. provides intrusion prevention
C. required in each layer of the network
D. filters traffic using Layer 3 and Layer 4 information only
Answer: (SHOW ANSWER)
NEW QUESTION: 24
A network administrator has designed a network with two multilayer switches on the distribution
layer, which act as default gateways for the end hosts. Which two technologies allow every end host
in a VLAN to use both gateways? (Choose two)
A. VSS
B. GLBP
C. HSRP
D. VRRP
E. MHSRP
Answer: (SHOW ANSWER)

NEW QUESTION: 25
When a wireless client roams between two different wireless controllers, a network connectivity
outage is experience for a period of time. Which configuration issue would cause this problem?
A. All of the controllers within the mobility group are using the same virtual interface IP address.
B. Not all of the controllers in the mobility group are using the same mobility group name.
C. All of the controllers in the mobility group are using the same mobility group name.
D. Not all of the controllers within the mobility group are using the same virtual interface IP address.
Answer: (SHOW ANSWER)

NEW QUESTION: 26
Refer to the exhibit. Communication between London and New York is down. Which command set
must be applied to the NewYork switch to resolve the issue?
A)

B)

C)
D)

A. Option A
B. Option C
C. Option D
D. Option B
Answer: (SHOW ANSWER)

NEW QUESTION: 27
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on
the network for the access points to successfully register to the WLC?
A. wlcbostname.domain.com
B. ap-manager.domain.com
C. cisco-capwap-controller.domain.com
D. primary-wlc.domain.com
Answer: (SHOW ANSWER)

NEW QUESTION: 28
Which method does Cisco DNA Center use to allow management of non-Cisco devices through
southbound protocols?
A. It creates device packs through the use of an SDK
B. It uses an API call to interrogate the devices and register the returned data.
C. It obtains MIBs from each vendor that details the APIs available.
D. It imports available APIs for the non-Cisco device in a CSV format.
Answer: (SHOW ANSWER)
Cisco DNA Center allows customers to manage their non-Cisco devices through the use of a
Software Development Kit (SDK) that can be used to create Device Packages for third-party
devices.

NEW QUESTION: 29
A network engineer is configuring Flexible Netflow and enters these commands Sampler Netflow1
Mode random one-out-of 100 Interface fastethernet 1/0 Flow-sampler netflow1 Which are two
results of implementing this feature instead of traditional Netflow? (Choose two.)
A. The accuracy of the data to be analyzed is improved
B. CPU and memory utilization are reduced.
C. The data export flow is more secure.
D. The number of packets to be analyzed are reduced
E. Only the flows of top 100 talkers are exported
Answer: (SHOW ANSWER)

NEW QUESTION: 30
Refer to Exhibit.

MTU has been configured on the underlying physical topology, and no MTU command has been
configured on the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the
GRE tunnel from host X to host Y, assuming the DF bit is cleared?
A. The packet arrives on router C without fragmentation.
B. The packet is discarded on router A
C. The packet is discarded on router B
D. The packet arrives on router C fragmented.
Answer: (SHOW ANSWER)

NEW QUESTION: 31
Which controller is capable of acting as a STUN server during the onboarding process of Edge
devices?
A. vBond
B. vSmart
C. vManage
D. PNP server
Answer: (SHOW ANSWER)

Valid 350-401 Dumps shared by Fast2test.com for Helping Passing 350-401 Exam!
Fast2test.com now offer the newest 350-401 exam dumps, the Fast2test.com 350-401 exam
questions have been updated and answers have been corrected get the newest
Fast2test.com 350-401 dumps with Test Engine here: https://www.fast2test.com/350-401-
premium-file.html (442 Q&As Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 32
Refer to the exhibit.

An engineer must create a configuration that executes the show run command and then terminates
the session when user CCNP legs in. Which configuration change is required''
A. Add the access-class keyword to the username command
B. Add the access-class keyword to the aaa authentication command
C. Add the autocommand keyword to the username command
D. Add the autocommand keyword to the aaa authentication command
Answer: (SHOW ANSWER)
The -autocommand causes the specified command to be issued automatically after the user logs in.
When the command is complete, the session is terminated. Because the command can be any
length and can contain embedded spaces, commands using the autocommand keyword must be
the last option on the line. In this specific question, we have to enter this line -username CCNP
autocommand show running-config.

NEW QUESTION: 33
Refer to the exhibit. An engineer is investigating why guest users are able to access other guest
user devices when the users are connected to the customer guest WLAN. What action resolves this
issue?
A. implement MFP client protection
B. implement split tunneling
C. implement P2P blocking
D. implement Wi-Fi direct policy
Answer: (SHOW ANSWER)
https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-1/configurationguide

NEW QUESTION: 34
Drag and drop the characteristics from the left onto the orchestration tools they describe on the
right.

Answer:

NEW QUESTION: 35
Which LISP component is required for a LISP site to communicate with a non-LISP site?
A. ETR
B. ITR
C. Proxy ITR
D. Proxy ETR
Answer: D (LEAVE A REPLY)
NEW QUESTION: 36
What is YANG used for?
A. providing a transport for network configuration data between client and server
B. describing data models
C. scraping data via CLI
D. processing SNMP read-only polls
Answer: (SHOW ANSWER)

NEW QUESTION: 37
Which data is properly formatted with JSON?
A)

B)

C)

D)
A. Option C
B. Option D
C. Option A
D. Option B
Answer: (SHOW ANSWER)

NEW QUESTION: 38
Which three methods does Cisco DNA Centre use to discover devices? (Choose three)
A. CDP
B. SNMP
C. LLDP
D. ping
E. NETCONF
F. a specified range of IP addresses
Answer: (SHOW ANSWER)

NEW QUESTION: 39
Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak
into the global routing table, but the configuration does not function as expected. Which action
resolves this issue?
A. Change the access-list number in the route map
B. Change the route-map configuration to VRF_BLUE.
C. Change the source network that Is specified in access-list 101.
D. Change the access-list destination mask to a wildcard.
Answer: (SHOW ANSWER)

NEW QUESTION: 40
A. to connect external Layer 3- network to the SD-Access fabric
B. to connect wired endpoint to the SD-Access fabric
C. to advertise fabric IP address space to external network
D. to connect the fusion router to the SD-Access fabric
Answer: (SHOW ANSWER)
+ Fabric edge node: This fabric device (for example, access or distribution layer device) connects

NEW QUESTION: 41
Running the script causes the output in the exhibit. Which change to the first line of the script
resolves the error?

A. from ncclient import


B. from ncclient import*
C. import ncclient manager
D. import manager
Answer: (SHOW ANSWER)

NEW QUESTION: 42
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises
deployment?
A. storage capacity
B. supported systems
C. efficient scalability
D. virtualization
Answer: C (LEAVE A REPLY)

NEW QUESTION: 43
What is the centralized control policy in a Cisco SD-WAN deployment?
A. list of ordered statements that define user access policies
B. list of enabled services for all nodes within the cloud
C. set of statements that defines how routing is performed
D. set of rules that governs nodes authentication within the cloud
Answer: (SHOW ANSWER)

NEW QUESTION: 44
Under which network conditions is an outbound QoS policy that is applied on a router WAN
interface most beneficial?
A. under network convergence condition
B. under traffic classification and marking conditions.
C. under all network condition
D. under interface saturation condition
Answer: (SHOW ANSWER)

NEW QUESTION: 45
A network is being migrated from IPV4 to IPV6 using a dual-stack approach. Network management
is already 100% IPV6 enabled. In a dual-stack network with two dual-stack NetFlow collections, how
many flow exporters are needed per network device in the flexible NetFlow configuration?
A. 1
B. 4
C. 8
D. 2
Answer: (SHOW ANSWER)

NEW QUESTION: 46
Which encryption hashing algorithm does NTP use for authentication?
A. AES128
B. SSL
C. AES256
D. MD5
Answer: (SHOW ANSWER)

Valid 350-401 Dumps shared by Fast2test.com for Helping Passing 350-401 Exam!
Fast2test.com now offer the newest 350-401 exam dumps, the Fast2test.com 350-401 exam
questions have been updated and answers have been corrected get the newest
Fast2test.com 350-401 dumps with Test Engine here: https://www.fast2test.com/350-401-
premium-file.html (442 Q&As Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 47
What is the function of the LISP map resolver?
A. to connect a site to the LISP-capable part of a core network publish the EID-to-RLOC mappings
for the site, and respond to map-request messages
B. to decapsulate map-request messages from ITRs and forward the messages to the MS.
C. to send traffic to non-LISP sites when connected to a service provider that does not accept
nonroutable ElDs as packet sources
D. to advertise routable non-LISP traffic from one address family to LISP sites in a different address
family
Answer: (SHOW ANSWER)

NEW QUESTION: 48
Refer to the exhibit. Which configuration change will force BR2 to reach 209 165 201 0/27 via BR1?
A. Set the weight attribute to 65.535 on BR1 toward PE1.
B. Set the origin to igp on BR2 toward PE2 inbound.
C. Set the MED to 1 on PE2 toward BR2 outbound.
D. Set the local preference to 150 on PE1 toward BR1 outbound
Answer: (SHOW ANSWER)

NEW QUESTION: 49
A network administrator is implementing a routing configuration change and enables routing debugs
to track routing behavior during the change. The logging output on the terminal is interrupting the
command typing process. Which two actions can the network administrator take to minimize the
possibility of typing commands incorrectly? (Choose two.)
A. Configure the logging delimiter feature
B. Press the TAB key to reprint the command in a new line
C. Configure the logging synchronous global configuration command
D. increase the number of lines on the screen using the terminal length command
E. Configure the logging synchronous command under the vty
Answer: B,E (LEAVE A REPLY)

NEW QUESTION: 50

A. Change the HSRP virtual address on the local router to 10.1.1.1


B. Change the HSRP virtual address on the remote router to 10.1.1.1
C. Change the HSRP group configuration on the remote router to 1.
D. Change the HSRP group configuration on the local router to 1.
Answer: (SHOW ANSWER)

NEW QUESTION: 51
An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it
must be the must be the active HSRP router. The peer router has been configured using the default
priority value. Which command set is required?
A)

B)

C)

D)

A. Option D
B. Option C
C. Option B
D. Option A
Answer: (SHOW ANSWER)

NEW QUESTION: 52
What is the differences between TCAM and the MAC address table?
A. The MAC address table is contained in CAM ACL and QoS information is stored in TCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
D. TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
Answer: (SHOW ANSWER)
https://community.cisco.com/t5/networking-documents/cam-content-addressable-memory-vs-tcam-
ternary-content/ta-p/3107938 When using Ternary Content Addressable Memory (TCAM) inside
routers it's used for faster address lookup that enables fast routing.
In switches Content Addressable Memory (CAM) is used for building and lookup of mac address
table that enables L2 forwarding decisions.
Besides Longest-Prefix Matching, TCAM in today's routers and multilayer Switch devices are used
to store ACL, QoS and other things from upper-layer processing.
NEW QUESTION: 53
A server running Linux is providing support for virtual machines along with DNS and DHCP services
for a small business. Which technology does this represent?
A. hardware pass-thru
B. Type 2 hypervisor
C. Type 1 hypervisor
D. container
Answer: (SHOW ANSWER)

NEW QUESTION: 54
What is one benefit of implementing a VSS architecture?
A. It provides a single point of management for improved efficiency.
B. It uses a single database to manage configuration for multiple switches
C. It provides multiple points of management for redundancy and improved support
D. It uses GLBP to balance traffic between gateways.
Answer: (SHOW ANSWER)

NEW QUESTION: 55
Which devices does Cisco DNA Center configure when deploying an IP-based access control
policy?
A. All devices integrating with ISE
B. selected individual devices
C. all devices in selected sites
D. all wired devices
Answer: (SHOW ANSWER)
When you click Deploy, Cisco DNA Center requests the Cisco Identity Services Engine (Cisco ISE)
to send notifications about the policy changes to the network devices.
Reference:
management/dna-center/1-3-1-
0/user_guide/b_cisco_dna_center_ug_1_3_1_0/b_cisco_dna_center_ug_1_3_1_0_chapter_01011.ht
ml

NEW QUESTION: 56
Refer to the exhibit.
What is the result when a switch that is running PVST+ is added to this network?
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.
Answer: (SHOW ANSWER)
From the output we see DSW2 is running in RSTP mode (in fact Rapid PVST+ mode as Cisco does
not support RSTP alone). When a new switch running PVST+ mode is added to the topology, they
keep running the old STP instances as RSTP (in fact Rapid PVST+) is compatible with PVST+.

NEW QUESTION: 57
What is the function of a fabric border node in a Cisco SD-Access environment?
A. To handle an ordered list of IP addresses and locations for endpoints in the fabric.
B. To collect traffic flow information toward external networks
C. To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks
D. To attach and register clients to the fabric
Answer: (SHOW ANSWER)

NEW QUESTION: 58
Refer to the exhibit.
Which configuration establishes EBGP neighborship between these two directly connected
neighbors and exchanges the loopback network of the two routers through BGP?
A)

B)

C)

D)
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
With BGP, we must advertise the correct network and subnet mask in the "network" command (in
this case network 10.1.1.0/24 on R1 and network 10.2.2.0/24 on R2). BGP is very strict in the
routing advertisements. In other words, BGP only advertises the network which exists exactly in the
routing table. In this case, if you put the command "network x.x.0.0 mask 255.255.0.0" or
"network x.0.0.0 mask 255.0.0.0" or "network x.x.x.x mask 255.255.255.255" then BGP will not
advertise anything.
It is easy to establish eBGP neighborship via the direct link. But let's see what are required when we
want to establish eBGP neighborship via their loopback interfaces. We will need two commands:
+ the command "neighbor 10.1.1.1 ebgp-multihop 2" on R1 and "neighbor 10.2.2.2 ebgpmultihop
2" on R1. This command increases the TTL value to 2 so that BGP updates can reach the BGP
neighbor which is two hops away.
+ Answer 'R1 (config) #router bgp 1
R1 (config-router) #neighbor 192.168.10.2 remote-as 2
R1 (config-router) #network 10.1.1.0 mask 255.255.255.0
R2 (config) #router bgp 2
R2 (config-router) #neighbor 192.168.10.1 remote-as 1
R2 (config-router) #network 10.2.2.0 mask 255.255.255.0
Quick Wireless Summary
Cisco Access Points (APs) can operate in one of two modes: autonomous or lightweight
+ Autonomous: self-sufficient and standalone. Used for small wireless networks.
+ Lightweight: A Cisco lightweight AP (LAP) has to join a Wireless LAN Controller (WLC) to
function.
LAP and WLC communicate with each other via a logical pair of CAPWAP tunnels.
- Control and Provisioning for Wireless Access Point (CAPWAP) is an IETF standard for control
messaging for setup, authentication and operations between APs and WLCs. CAPWAP is similar to
LWAPP except the following differences:
+CAPWAP uses Datagram Transport Layer Security (DTLS) for authentication and encryption to
protect traffic between APs and controllers. LWAPP uses AES.
+ CAPWAP has a dynamic maximum transmission unit (MTU) discovery mechanism.
+ CAPWAP runs on UDP ports 5246 (control messages) and 5247 (data messages) An LAP
operates in one of six different modes:
+ Local mode (default mode): measures noise floor and interference, and scans for intrusion
detection (IDS) events every 180 seconds on unused channels
+ FlexConnect, formerly known as Hybrid Remote Edge AP (H-REAP), mode: allows data traffic to
be switched locally and not go back to the controller. The FlexConnect AP can perform standalone
client authentication and switch VLAN traffic locally even when it's disconnected to the WLC (Local
Switched). FlexConnect AP can also tunnel (via CAPWAP) both user wireless data and control
traffic to a centralized WLC (Central Switched).
+ Monitor mode: does not handle data traffic between clients and the infrastructure. It acts like a
sensor for location-based services (LBS), rogue AP detection, and IDS
+ Rogue detector mode: monitor for rogue APs. It does not handle data at all.
+ Sniffer mode: run as a sniffer and captures and forwards all the packets on a particular channel to
a remote machine where you can use protocol analysis tool (Wireshark, Airopeek, etc) to review the
packets and diagnose issues. Strictly used for troubleshooting purposes.
+ Bridge mode: bridge together the WLAN and the wired infrastructure together.
Mobility Express is the ability to use an access point (AP) as a controller instead of a real WLAN
controller. But this solution is only suitable for small to midsize, or multi-site branch locations where
you might not want to invest in a dedicated WLC. A Mobility Express WLC can support up to 100
Aps

NEW QUESTION: 59
Refer to the exhibit.

What are two effects of this configuration? (Choose two.)


A. R1 becomes the active router.
B. If R1 goes down, R2 becomes active but reverts to standby when R1 comes back online.
C. If R1 goes down. R2 becomes active and remains the active device when R1 comes back online.
D. If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online.
E. R1 becomes the standby router.
Answer: (SHOW ANSWER)

NEW QUESTION: 60

A. username/role combination
B. access tokens
C. cookie authentication
D. basic signature workflow
Answer: (SHOW ANSWER)
The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens:
+ access token: sent like an API key, it allows the application to access a user's data; optionally,
access tokens can expire.
+ refresh token: optionally part of an OAuth flow, refresh tokens retrieve a new access token if they
have expired. OAuth2 combines Authentication and Authorization to allow more sophisticated scope
and validity control.

NEW QUESTION: 61
Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?


A. Router Chicago because it has a lower router ID
B. Router NewYork because it has a higher router ID
C. This segment has no designated router because it is a p2p network type.
D. This segment has no designated router because it is a nonbroadcast network type.
Answer: (SHOW ANSWER)

Valid 350-401 Dumps shared by Fast2test.com for Helping Passing 350-401 Exam!
Fast2test.com now offer the newest 350-401 exam dumps, the Fast2test.com 350-401 exam
questions have been updated and answers have been corrected get the newest
Fast2test.com 350-401 dumps with Test Engine here: https://www.fast2test.com/350-401-
premium-file.html (442 Q&As Dumps, 30%OFF Special Discount: freecram)

NEW QUESTION: 62
Refer to the exhibit. A network engineer must configure a password expiry mechanism on the
gateway router for all local passwords to expire after 60 days. What is required to complete this
task?
A. No further action Is required. The configuration is complete.
B. Add the username admin privilege 15 common-criteria*policy Administrators password 0
Cisco13579! command.
C. The password expiry mechanism is on the AAA server and must be configured there.
D. Add the aaa authentication enable default Administrators command.
Answer: (SHOW ANSWER)

NEW QUESTION: 63
Which two methods are used to reduce the AP coverage area? (Choose two)
A. Reduce AP transmit power.
B. Disable 2.4 GHz and use only 5 GHz.
C. Reduce channel width from 40 MHz to 20 MHz
D. Increase minimum mandatory data rate
E. Enable Fastlane
Answer: (SHOW ANSWER)

NEW QUESTION: 64
What is a consideration when designing a Cisco SD-Access underlay network?
A. End user subnets and endpoints are part of the underlay network.
B. The underlay switches provide endpoint physical connectivity for users.
C. Static routing is a requirement,
D. It must support IPv4 and IPv6 underlay networks
Answer: (SHOW ANSWER)

NEW QUESTION: 65
Which technology is used as the basis for the cisco sd-access data plane?
A. VXLAN
B. LISP
C. IPsec
D. 802.1Q
Answer: (SHOW ANSWER)

NEW QUESTION: 66
What are two benefits of YANG? (Choose two.)
A. It collects statistical constraint analysis information.
B. It enables multiple leaf statements to exist within a leaf list
C. It enforces configuration constraints.
D. It enforces the use of a specific encoding format for NETCONF
E. It enforces configuration semantics.
Answer: (SHOW ANSWER)
NEW QUESTION: 67
Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the
objectives they accomplish on the right.

Answer:

NEW QUESTION: 68
Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface
GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

A. Option A
B. Option D
C. Option C
D. Option B
Answer: (SHOW ANSWER)

NEW QUESTION: 69
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
A. MTU
B. Window size
C. MRU
D. MSS
Answer: (SHOW ANSWER)
The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is
willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP
layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a
TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is
not negotiated between hosts. The sending host is required to limit the size of data in a single TCP
segment to a value less than or equal to the MSS reported by the receiving host.
TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not
handle the case where there is a smaller MTU link in the middle between these two endpoints.
PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is

NEW QUESTION: 70

A. They enable programmers to change or write their own application within the device operating
system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability and
consistency.
Answer: (SHOW ANSWER)
Yet Another Next Generation (YANG) is a language which is only used to describe data models
(structure). It is not XML or JSON.

NEW QUESTION: 71
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)

B)
C)

D)

A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
CoPP protects the route processor on network devices by treating route processor resources as a
separate entity with its own ingress interface (and in some implementations, egress also). CoPP is
used to police traffic that is destined to the route processor of the router such as:
+ routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.
Therefore we must apply the CoPP to deal with SSH because it is in the
management plane. CoPP must be put under "control-plane" command.

NEW QUESTION: 72
Which method should an engineer use to deal with a long-standing contention issue between any
two VMs on the same host?
A. Live migrate the VM to another host
B. Reset the host
C. Reset the VM
D. Adjust the resource reservation limits
Answer: (SHOW ANSWER)

NEW QUESTION: 73
Refer to the exhibit.

Which JSON syntax is derived from this data?


A)
B)

C)

D)

A. Option A
B. Option D
C. Option B
D. Option C
Answer: (SHOW ANSWER)

NEW QUESTION: 74
Which AP mode allows an engineer to scan configured channels for rogue access points?
A. sniffer
B. monitor
C. local
D. bridge
Answer: (SHOW ANSWER)

NEW QUESTION: 75
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from
one access point to another on a different access switch using a single WLC?
A. fast roam
B. auto anchor
C. inter-xTR
D. Layer 3
Answer: A (LEAVE A REPLY)

Valid 350-401 Dumps shared by Fast2test.com for Helping Passing 350-401 Exam!
Fast2test.com now offer the newest 350-401 exam dumps, the Fast2test.com 350-401 exam
questions have been updated and answers have been corrected get the newest
Fast2test.com 350-401 dumps with Test Engine here: https://www.fast2test.com/350-401-
premium-file.html (442 Q&As Dumps, 30%OFF Special Discount: freecram)

You might also like