Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-401
Free trial
Verified
Question 151
Which two security features are available when implementing NTP? (Choose two.)
- A: encrypted authentication mechanism
- B: symmetric server passwords
- C: clock offset authentication
- D: broadcast association mode
- E: access list-based restriction scheme
Question 152
How does the EIGRP metric differ from the OSPF metric?
- A: The EIGRP metric is calculated based on bandwidth only. The OSPF metric is calculated on delay only.
- B: The EIGRP metric is calculated based on delay only. The OSPF metric is calculated on bandwidth and delay.
- C: The EIGRP metric is calculated based on bandwidth and delay. The OSPF metric is calculated on bandwidth only.
- D: The EIGRP metric is calculated based on hop count and bandwidth. The OSPF metric is calculated on bandwidth and delay.
Question 153
Refer to the exhibit.
An engineer is installing a new pair of routers in a redundant configuration.
Which protocol ensures that traffic is not disrupted in the event of a hardware failure?
- A: HSRPv1
- B: GLBP
- C: VRRP
- D: HSRPv2
Question 154
Refer to the exhibit. After an engineer configures an EtherChannel between switch SW1 and switch SW2, this error message is logged on switch SW2:
SW2#
09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/0, putting Gi0/0 in err-disable state
09:45:32: %PM-4-ERR_DISABLE: channel-misconfig error detected on Gi0/1, putting Gi0/1 in err-disable state
Based on the output from switch SW1 and the log message received on switch SW2, what action should the engineer take to resolve this issue?
- A: Configure the same protocol on the EtherChannel on switch SW1 and SW2.
- B: Define the correct port members on the EtherChannel on switch SW1.
- C: Correct the configuration error on Interface Gi0/0 on switch SW1.
- D: Correct the configuration error on Interface Gi0/1 on switch SW1.
Question 155
Refer to the exhibit. Communication between London and New York is down. Which command set must be applied to resolve this issue?
- A: NewYork(config)#int f0/1 NewYork(config)#switchport nonegotiate NewYork(config)#end NewYork#
- B: NewYork(config)#int f0/1 NewYork(config)#switchport mode trunk NewYork(config)#end NewYork#
- C: NewYork(config)#int f0/1 NewYork(config)#switchport trunk encap dot1q NewYork(config)#end NewYork#
- D: NewYork(config)#int f0/1 NewYork(config)#switchport mode dynamic desirable NewYork(config)#end NewYork#
Question 156
Which technology is used to provide Layer 2 and Layer 3 logical networks in the Cisco SD-Access architecture?
- A: underlay network
- B: VPN routing/forwarding
- C: easy virtual network
- D: overlay network
Question 157
Which encryption hashing algorithm does NTP use for authentication?
- A: SSL
- B: MD5
- C: AES128
- D: AES256
Question 158
Refer to the exhibit. The trunk between Gig1/0/1 of switch SW2 and Gig1/0/1 of switch SW1 is not operational. Which action resolves this issue?
- A: Configure both interfaces to nonegotiate and ensure that the switches are in different VTP domains.
- B: Configure both interfaces in dynamic auto DTP mode and ensure that the switches are in the same VTP domain.
- C: Configure both interfaces in dynamic auto DTP mode and ensure that the switches are in different VTP domains.
- D: Configure both interfaces in dynamic desirable DTP mode and ensure that the switches are in the same VTP domain.
Question 159
Refer to the exhibit. Which two facts does the device output confirm? (Choose two.)
- A: The device's HSRP group uses the virtual IP address 10.0.3.242.
- B: The device is configured with the default HSRP priority.
- C: The device sends unicast messages to its peers.
- D: The standby device is configured with the default HSRP priority.
- E: The device is using the default HSRP hello timer.
Question 160
Refer to the exhibit. Which type of antenna is shown on the radiation patterns?
- A: patch
- B: dipole
- C: omnidirectional
- D: Yagi
Question 161
DRAG DROP -
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Select and Place:
Question 162
Refer to the exhibit. All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over the Gi1/3 trunk port between DSW1 and DSW2? (Choose two.)
- A: DSW2(config)#interface gi1/3
- B: DSW1(config-if)#spanning-tree port-priority 0
- C: DSW2(config-if)#spanning-tree port-priority 128
- D: DSW1(config)#interface gi1/3
- E: DSW2(config-if)#spanning-tree port-priority 16
Question 163
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however, clients cannot roam between the 5520 and 9800 controllers without dropping their connection. Which feature must be configured to remedy the issue?
- A: mobility MAC on the 5520 cluster
- B: mobility MAC on the 9800 WLC
- C: new mobility on the 5520 cluster
- D: new mobility on the 9800 WLC
Question 164
Refer to the exhibit. Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0/24 network?
- A: R2 standby 1 priority 90 standby 1 preempt
- B: R2 standby 1 priority 100 standby 1 preempt
- C: R1 standby 1 preempt R2 standby 1 priority 90
- D: R1 standby 1 preempt R2 standby 1 priority 100
Question 165
A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)
- A: WPA2 (AES)
- B: 802.1X
- C: OPEN
- D: WEP
- E: WPA (AES)
Question 166
Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)
- A: Utilize DHCP option 43.
- B: Utilize DHCP option 17.
- C: Configure an ip helper-address on the router interface.
- D: Enable port security on the switch port.
- E: Configure WLC IP address on LAN switch
Question 167
What is the difference between CEF and process switching?
- A: CEF processes packets that are too complex for process switching to manage.
- B: Process switching is faster than CEF.
- C: CEF uses the FIB and the adjacency table to make forwarding decisions, whereas process switching punts each packet.
- D: CEF is more CPU-intensive than process switching.
Question 168
Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3?
- A: Configure switchport mode trunk on SW2.
- B: Configure switchport nonegotiate on SW3.
- C: Configure channel-group 1 mode desirable on both interfaces.
- D: Configure channel-group 1 mode active on both interfaces.
Question 169
Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interfaces are able to establish OSPF adjacency?
- A: GigabitEthernet0/0 and GigabitEthernet0/1
- B: only GigabitEthernet0/1
- C: only GigabitEthernet0/0
- D: GigabitEthernet0/1 and GigabitEthernet0/1.40
Question 170
DRAG DROP -
Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.
Select and Place:
Question 171
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)
- A: Cisco Discovery Protocol neighbor
- B: querying other APs
- C: DHCP Option 43
- D: broadcasting on the local subnet
- E: DNS lookup CISCO-DNA-PRIMARY.localdomain
Question 172
What is the responsibility of a secondary WLC?
- A: It enables Layer 2 and Layer 3 roaming between itself and the primary controller.
- B: It registers the LAPs if the primary controller fails.
- C: It avoids congestion on the primary controller by sharing the registration load on the LAPs.
- D: It shares the traffic load of the LAPs with the primary controller.
Question 173
Refer to the exhibit.
Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?
- A: text string
- B: username and password
- C: RADIUS token
- D: certificate
Question 174
A client device fails to see the enterprise SSID, but other client devices are connected to it.
What is the cause of this issue?
- A: The client has incorrect credentials stored for the configured broadcast SSID.
- B: The hidden SSID was not manually configured on the client.
- C: The broadcast SSID was not manually configured on the client.
- D: The client has incorrect credentials stored for the configured hidden SSID.
Question 175
Which two descriptions of FlexConnect mode for Cisco APs are true? (Choose two.)
- A: APs that operate in FlexConnect mode cannot detect rogue APs.
- B: When connected to the controller, FlexConnect APs can tunnel traffic back to the controller.
- C: FlexConnect mode is used when the APs are set up in a mesh environment and used to bridge between each other.
- D: FlexConnect mode is a feature that is designed to allow specified CAPWAP-enabled APs to exclude themselves from managing data traffic between clients and infrastructure.
- E: FlexConnect mode is a wireless solution for branch office and remote office deployments.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!