Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

350-401Free trialFree trial

By cisco
Aug, 2025

Verified

25Q per page

Question 151

Which two security features are available when implementing NTP? (Choose two.)

  • A: encrypted authentication mechanism
  • B: symmetric server passwords
  • C: clock offset authentication
  • D: broadcast association mode
  • E: access list-based restriction scheme

Question 152

How does the EIGRP metric differ from the OSPF metric?

  • A: The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only.
  • B: The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay.
  • C: The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only.
  • D: The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay.

Question 153

Refer to the exhibit.

Image 1

An engineer is installing a new pair of routers in a redundant configuration.
Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

  • A: HSRPv1
  • B: GLBP
  • C: VRRP
  • D: HSRPv2

Question 154

Image 1

Refer to the exhibit. After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2:
SW2#
09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/0, putting Gi0/0 in err-disable state
09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/1, putting Gi0/1 in err-disable state
Based on the output from switch SW1 and the log message received on switch SW2, what action should the engineer take to resolve this issue?

  • A: Configure the same protocol on the EtherChannel on switch SW1 and SW2.
  • B: Define the correct port members on the EtherChannel on switch SW1.
  • C: Correct the configuration error on Interface Gi0/0 on switch SW1.
  • D: Correct the configuration error on Interface Gi0/1 on switch SW1.

Question 155

Image 1

Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue?

  • A: NewYork(config)#int f0/1 NewYork(config)#switchport nonegotiate NewYork(config)#end NewYork#
  • B: NewYork(config)#int f0/1 NewYork(config)#switchport mode trunk NewYork(config)#end NewYork#
  • C: NewYork(config)#int f0/1 NewYork(config)#switchport trunk encap dot1q NewYork(config)#end NewYork#
  • D: NewYork(config)#int f0/1 NewYork(config)#switchport mode dynamic desirable NewYork(config)#end NewYork#

Question 156

Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?

  • A: underlay network
  • B: VPN routing/forwarding
  • C: easy virtual network
  • D: overlay network

Question 157

Which encryption hashing algorithm does NTP use for authentication?

  • A: SSL
  • B: MD5
  • C: AES128
  • D: AES256

Question 158

Image 1

Refer to the exhibit. The trunk between Gig1/0/1 of switch SW2 and Gig1/0/1 of switch SW1 is not operational. Which action resolves this issue?

  • A: Configure both interfaces to nonegotiate and ensure that the switches are in different VTP domains.
  • B: Configure both interfaces in dynamic auto DTP mode and ensure that the switches are in the same VTP domain.
  • C: Configure both interfaces in dynamic auto DTP mode and ensure that the switches are in different VTP domains.
  • D: Configure both interfaces in dynamic desirable DTP mode and ensure that the switches are in the same VTP domain.

Question 159

Image 1

Refer to the exhibit. Which two facts does the device output confirm? (Choose two.)

  • A: The device's HSRP group uses the virtual IP address 10.0.3.242.
  • B: The device is configured with the default HSRP priority.
  • C: The device sends unicast messages to its peers.
  • D: The standby device is configured with the default HSRP priority.
  • E: The device is using the default HSRP hello timer.

Question 160

Image 1

Refer to the exhibit. Which type of antenna is shown on the radiation patterns?

  • A: patch
  • B: dipole
  • C: omnidirectional
  • D: Yagi

Question 161

DRAG DROP -
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Select and Place:

Image 1

Question 162

Image 1

Refer to the exhibit. All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over the Gi1/3 trunk port between DSW1 and DSW2? (Choose two.)

  • A: DSW2(config)#interface gi1/3
  • B: DSW1(config-if)#spanning-tree port-priority 0
  • C: DSW2(config-if)#spanning-tree port-priority 128
  • D: DSW1(config)#interface gi1/3
  • E: DSW2(config-if)#spanning-tree port-priority 16

Question 163

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?

  • A: mobility MAC on the 5520 cluster
  • B: mobility MAC on the 9800 WLC
  • C: new mobility on the 5520 cluster
  • D: new mobility on the 9800 WLC

Question 164

Image 1

Refer to the exhibit. Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0/24 network?

  • A: R2 standby 1 priority 90 standby 1 preempt
  • B: R2 standby 1 priority 100 standby 1 preempt
  • C: R1 standby 1 preempt R2 standby 1 priority 90
  • D: R1 standby 1 preempt R2 standby 1 priority 100

Question 165

A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)

  • A: WPA2 (AES)
  • B: 802.1X
  • C: OPEN
  • D: WEP
  • E: WPA (AES)

Question 166

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

  • A: Utilize DHCP option 43.
  • B: Utilize DHCP option 17.
  • C: Configure an ip helper-address on the router interface.
  • D: Enable port security on the switch port.
  • E: Configure WLC IP address on LAN switch

Question 167

What is the difference between CEF and process switching?

  • A: CEF processes packets that are too complex for process switching to manage.
  • B: Process switching is faster than CEF.
  • C: CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.
  • D: CEF is more CPU-intensive than process switching.

Question 168

Image 1

Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3?

  • A: Configure switchport mode trunk on SW2.
  • B: Configure switchport nonegotiate on SW3.
  • C: Configure channel-group 1 mode desirable on both interfaces.
  • D: Configure channel-group 1 mode active on both interfaces.

Question 169

Image 1

Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?

  • A: GigabitEthernet0/0 and GigabitEthernet0/1
  • B: only GigabitEthernet0/1
  • C: only GigabitEthernet0/0
  • D: GigabitEthernet0/1 and GigabitEthernet0/1.40

Question 170

DRAG DROP -
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
Select and Place:

Image 1

Question 171

Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)

  • A: Cisco Discovery Protocol neighbor
  • B: querying other APs
  • C: DHCP Option 43
  • D: broadcasting on the local subnet
  • E: DNS lookup CISCO-DNA-PRIMARY.localdomain

Question 172

What is the responsibility of a secondary WLC?

  • A: It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
  • B: It registers the LAPs if the primary controller fails.
  • C: It avoids congestion on the primary controller by sharing the registration load on the LAPs.
  • D: It shares the traffic load of the LAPs with the primary controller.

Question 173

Refer to the exhibit.

Image 1

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

  • A: text string
  • B: username and password
  • C: RADIUS token
  • D: certificate

Question 174

A client device fails to see the enterprise SSID, but other client devices are connected to it.
What is the cause of this issue?

  • A: The client has incorrect credentials stored for the configured broadcast SSID.
  • B: The hidden SSID was not manually configured on the client.
  • C: The broadcast SSID was not manually configured on the client.
  • D: The client has incorrect credentials stored for the configured hidden SSID.

Question 175

Which two descriptions of FlexConnect mode for Cisco APs are true? (Choose two.)

  • A: APs that operate in FlexConnect mode cannot detect rogue APs.
  • B: When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.
  • C: FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between each other.
  • D: FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude themselves from managing data traffic between clients and infrastructure.
  • E: FlexConnect mode is a wireless solution for branch office and remote office deployments.
Page 7 of 43 • Questions 151-175 of 1063

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!