350-401 Exam Questions

Total 839 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Which situation has occurred?


A.

The object could not be located at the URI path.


B.

The command succeeded in deleting the object


C.

The object was located at the URI, but it could not be deleted


D.

The URI was invalid





B.
  

The command succeeded in deleting the object



Explanation: HTTP Status 204 (No Content) indicates that the server has successfully fulfilled the request and that there is no content to send in the response payload body.

Which encryption hashing algorithm does NTP use for authentication?


A.

SSL


B.

MD5


C.

AES128


D.

AES256





B.
  

MD5



Explanation: An example of configuring NTP authentication is shown below: Router1(config)#ntp authentication-key 2 md5 itexamanswersRouter1(config)#ntp authenticateRouter1(config)#ntp trusted-key 2

A customer requests a network design that supports these requirements:

Which protocol does the design include?


A.

HSRP version 2


B.

VRRP version 2


C.

GLBP


D.

VRRP version 3





D.
  

VRRP version 3



Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?


A.

under interface saturation condition


B.

under network convergence condition


C.

under all network condition


D.

under traffic classification and marking conditions





A.
  

under interface saturation condition



A customer has recently implemented a new wireless infrastructure using WLC-5520 at a site directly next to a large commercial airport. Users report that they intermittently lose WIFI connectivity, and troubleshooting reveals it is due to frequent channel changes. Which two actions fix this issue? (Choose two)


A.

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list


B.

Restore the DCA default settings because this automatically avoids channel interference.


C.

Configure channels on the UNIk2 and the Extended UNII-2 sub-bands of the 5 Ghz band only


D.

Enable DFS channels because they are immune to radar interference


E.

Disable DFS channels to prevent interference with Doppler radar





A.
  

Remove UNII-2 and Extended UNII-2 channels from the 5 Ghz channel list



E.
  

Disable DFS channels to prevent interference with Doppler radar



What is the output of this code?


A.

username Cisco


B.

get_credentials


C.

username


D.

CISCO





D.
  

CISCO




A.

Option A


B.

Option B


C.

Option C


D.

Option D





D.
  

Option D



Refer to the exhibit.

A network engineer configures a GRE tunnel and enters the show Interface tunnel command. What does the output confirm about the configuration?


A.

The keepalive value is modified from the default value.


B.

Interface tracking is configured.


C.

The tunnel mode is set to the default


D.

The physical interface MTU is 1476 bytes.





C.
  

The tunnel mode is set to the default



Refer to the exhibit. An engineer is configuring an EtherChannel between Switch1 and Switch2 and notices the console message on switch2. Based on the output, which action resolves this issue?


A.

Configure less member ports on Switch2.


B.

Configure the same port channel interface number on both switches


C.

Configure the same EtherChannel protocol on both switches


D.

Configure more member ports on Switch1.





C.
  

Configure the same EtherChannel protocol on both switches



Explanation: In this case, we are using your EtherChannel without a negotiation protocol on Switch2. As a result, if the opposite switch is not also configured for EtherChannel operation on the respective ports, there is a danger of a switching loop. The EtherChannel Misconfiguration Guard tries to prevent that loop from occuring by disabling all the ports bundled in the EtherChannel.

Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?

 


A.

MTU


B.

Window size


C.

MRU


D.

MSS





D.
  

MSS



Explanation: The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.

TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints. PMTUD was developed in order to avoid fragmentation in the path between the endpoints.


Page 8 out of 84 Pages
Previous