Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-401
Free trial
Verified
Question 51
Which configuration creates a CoPP policy that provides unlimited SSH access from client 10.0.0.5 and denies access from all other SSH clients?
- A:
- B:
- C:
- D:
Question 52
Which access control feature does MAB provide?
- A: simultaneous user and device authentication
- B: allows devices to bypass authentication
- C: network access based on the physical address of a device
- D: user access based on IP address
Question 53
What is provided to the client to identify the authenticated session in subsequent API calls after authenticating to the Cisco DNA Center API?
- A: authentication token
- B: client X.509 certificate
- C: session cookie
- D: username and password
Question 54
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which script should be applied to receive an SNMP trap and a critical-level log message?
- A: action 1.0 snmp-trap strdata “Configuration change alarm” action 1.0 syslog priority critical msg “Configuration change alarm”
- B: action 1.0 snmp-trap strdata “Configuration change alarm” action 2.0 syslog msg “Configuration change alarm”
- C: action 1.0 snmp-trap strdata “Configuration change alarm” action 1.1 syslog priority critical msg “Configuration change alarm”
- D: action 1.0 snmp-trap strdata “Configuration change critical alarm”
Question 55
How does the Cisco SD-Access control plane simplify traditional routing environments?
- A: Routing adjacencies are no longer required.
- B: Separation of EID and RLOC reduces the size of routing tables.
- C: Routers query all routes to the map server.
- D: Full routing tables are shared and ensure that all routers know all paths within the underlay fabric and overlay.
Question 56
Which template is used when multiple templates are grouped together to run in succession in Cisco DNA Center?
- A: project
- B: regular
- C: configuration
- D: composite
Question 57
In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?
- A: SNR
- B: RSSI
- C: EIRP
- D: dBi
Question 58
Which method requires a client to authenticate and has the capability to function without encryption?
- A: WEP
- B: PSK
- C: open
- D: WebAuth
Question 59
An engineer must update the local web authentication details on a Cisco 5520 WLC. The engineer has one active SSID configured for web authentication and plans to update the virtual interface with a nonroutable IP address. Which command must the engineer apply?
- A: config wlan create wlan_idname
- B: config interface address virtual 1.1.1.1
- C: config interface address dynamic-interface virtual 192.0.2.1
- D: config interface address virtual 192.0.2.1
Question 60
Refer to the exhibit. What is achieved when this Python script is executed?
- A: All devices that are looped through in the devices.txt file are put into a list that is appended to the parent dictionary.
- B: All devices that are looped through in the devices.txt file are put into a single dictionary that is appended to the parent list.
- C: Each device that is looped through in the devices.txt file is put into its own list that is appended to the parent dictionary.
- D: Each device that is looped through in the devices.txt file is put into its own dictionary that is appended to the parent list.
Question 61
Refer to the exhibit. Why does OSPF fail to establish an adjacency between R1 and R2?
- A: authentication mismatch
- B: interface MTU mismatch
- C: timers mismatch
- D: area mismatch
Question 62
SIMULATION
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
Tasks
The operations team started configuring network devices for a new site. Complete the configurations to achieve these goals:
- Configure Rapid PVST+ on SW20.
- The trunk between SW20 and SW30 is not operational. Troubleshoot the issue and ensure PC3 can ping PC1 (10.10.100.10) across the link.
- The LACP port channel between SW10 and SW20 is not operational. Troubleshoot the issue and ensure PC3 can ping PC2 (10.10.100.20) across the port channel.
Note: No access is provided to SW10 or SW30. Resolve these issues by making changes only to SW20. Traffic on all trunks should be restricted to only active VLANs.
Question 63
What is a characteristic of Layer 3 roaming?
- A: It provides seamless roaming between APs that are connected to different Layer 3 networks and different mobility groups.
- B: It is only supported on controllers that run SSO.
- C: Clients must obtain a new IP address when they roam between APs.
- D: It provides seamless client roaming between APs in different Layer 3 networks but within the same mobility group.
Question 64
An administrator must enable Telnet access to Router X using the router username and password database for authentication. Which configuration should be applied?
- A: RouterX(config)# line aux 0 - RouterX(config-line)# password cisco RouterX(config-line)# login -
- B: RouterX(config)# aaa new-model - RouterX(config)# aaa authentication login auth-list local
- C: RouterX(config)# line vty 0 4 - RouterX(config-line)# login - RouterX(config-line)# end -
- D: RouterX(config)# line vty 0 4 - RouterX(config-line)# login local RouterX(config-line)# end
Question 65
Which configuration enables a device to be configured via NETCONF over SSHv2?
- A:
- B:
- C:
- D:
Question 66
SIMULATION
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary pre-configurations have been applied.
• Do not remove any existing configurations from the devices, only those necessary to make the appropriate changes required to fulfill the listed tasks.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
Tasks
Configure R1 according to the topology to achieve these results:
- Configure eBGP using Loopback 0 for the router-id. Do not use the address-family command to accomplish this.
- Advertise R1’s Loopback 100 and Loopback 200 networks to AS200 and AS300.
Question 67
Refer to the exhibit. An engineer must configure PAT to provide internet access to all users by using one global address for many local addresses. Which command set completes the configuration?
- A: RouterA(config)# ip nat inside source static 172.16.1.1 172.16.1.2
- B: RouterA(config)# ip nat inside source list 1 pool cisco
- C: RouterA(config)# ip nat inside source static 172.16.1.1 193.64.64.1
- D: RouterA(config)# ip nat inside source list 1 pool cisco overload
Question 68
What does the LAP send when multiple WLCs respond to the CISCO-CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?
- A: unicast discovery request to the first WLC that resolves the domain name
- B: broadcast discovery request
- C: join request to all the WLCs
- D: unicast discovery request to each WLC
Question 69
A network engineer must configure the VTY lines on a router to achieve these results:
• Remote access should be permitted for all feasible protocols.
• Only a password should be required for device authentication.
• All idle EXEC sessions must be terminated in 60 minutes.
Which configuration should be applied?
- A: line vty 0 15 password Cisco123 transport input ssh exec-timeout 60
- B: line vty 0 15 login password Cisco123 transport input all absolute-timeout 60
- C: line vty 0 15 password Cisco123 transport input all exec-timeout 60
- D: line vty 0 15 transport input telnet ssh rlogin login local absolute-timeout 60
Question 70
What is a characteristic of Wi-Fi channels?
- A: The 2.4-GHz band has 24 non-overlapping channels.
- B: Devices that connect to the same Wi-Fi channel reside in the same collision domain.
- C: Wi-Fi channels are spaced 30 MHz apart.
- D: The 5-GHz band offers 11 different channels for Wi-Fi clients.
Question 71
Which function is handled by vManage in the Cisco SD-WAN fabric?
- A: Establishes IPsec tunnels with nodes.
- B: Performs remote software upgrades for WAN Edge, vSmart, and vBond.
- C: Distributes policies that govern data forwarding.
- D: Establishes BFD sessions to test liveliness of links and nodes.
Question 72
SIMULATION
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
Tasks
OSPF is preconfigured on all devices except R20. Configure R20 to complete these tasks.
Task 1:
Configure OSPF according to the topology using these requirements:
• Use Process ID 10.
• Use Loopback1 for the Router ID.
• Advertise all networks into OSPF.
o Use network statements under the OSPF process to accomplish this task.
Task 2:
Configure a /20 summary route for Area 40.
• Advertise only Type 3 LSAs into Area 0.
R20
Question 73
Which JSON script is properly formatted?
- A:
- B:
- C:
- D:
Question 74
What is a benefit of MACsec in a multilayered LAN network design?
- A: Application flows between hosts on the LAN to remote destinations can be encrypted.
- B: Layer 2 trunk links between switches can be secured.
- C: There is no requirement to run IEEE 802.1X when MACsec is enabled on a switch port.
- D: Layer 3 links between switches can be secured.
Question 75
SIMULATION
Guidelines
This is a lab item in which tasks will be performed on virtual devices.
• Refer to the Tasks tab to view the tasks for this lab item.
• Refer to the Topology tab to access the device console(s) and perform the tasks.
• Console access is available for all required devices by clicking the device icon or using the tab(s) above the console window.
• All necessary preconfigurations have been applied.
• Do not change the enable password or hostname for any device.
• Save your configurations to NVRAM before moving to the next item.
• Click Next at the bottom of the screen to submit this lab and move to the next question.
• When Next is clicked, the lab closes and cannot be reopened.
Topology
Tasks
The operations team started configuring network devices for a new site. R10 and R20 are preconfigured with the CORP VRF. R10 has network connectivity to R20. Complete the configurations to achieve these goals:
- Extend the CORP VRF between R10 and R20 using Tunnel0.
- Protect Tunnel0 using the preconfigured profile.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!