350-401 Exam Questions

Total 839 Questions

Last Updated Exam : 16-Dec-2024

Topic 1: Exam Pool A

A network administrator has designed a network with two multilayer switches on the distribution layer, which act as default gateways for the end hosts. Which two technologies allow every end host in a VLAN to use both gateways? (Choose two)


A.

GLBP


B.

HSRP


C.

MHSRP


D.

VSS


E.

VRRP





A.
  

GLBP



C.
  

MHSRP



How does an on-premises infrastructure compare to a cloud infrastructure?


A.

On-premises can increase compute power faster than cloud


B.

On-premises requires less power and cooling resources than cloud


C.

On-premises offers faster deployment than cloud


D.

On-premises offers lower latency for physically adjacent systems than cloud.





D.
  

On-premises offers lower latency for physically adjacent systems than cloud.



Refer the exhibit.

Which router is the designated router on the segment 192.168.0.0/24?


A.

This segment has no designated router because it is a nonbroadcast network type


B.

This segment has no designated router because it is a p2p network type.


C.

Router Chicago because it has a lower router ID


D.

Router NewYork because it has a higher router ID





B.
  

This segment has no designated router because it is a p2p network type.



Refer to the exhibit.

An engineer must block all traffic from a router to its directly connected subnet
209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true?


A.

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.


B.

Only standard access control lists can block traffic from a source IP address.


C.

After an access control list is applied to an interface, that interface must be shut and no shut for the access control list to take effect.


D.

The access control list must contain an explicit deny to block traffic from the router.





A.
  

Access control lists that are applied outbound to a router interface do not affect traffic that is sourced from the router.



Refer to the exhibit. An engineer attempts to create a configuration to allow the Blue VRF to leak into the global routing table, but the configuration does not function as expected. Which action resolves this issue?


A.

Change the access-list destination mask to a wildcard


B.

Change the source network that Is specified in access-list 101.


C.

Change the route-map configuration to VRF_BLUE.


D.

Change the access-list number in the route map





A.
  

Change the access-list destination mask to a wildcard



An engineer must configure HSRP group 300 on a Cisco IOS router. When the router is functional, it must be the must be the active HSRP router. The peer router has been configured using the default priority value. Which command set is required?

 


A.

Option A


B.

Option B


C.

Option C


D.

Option D





B.
  

Option B




A.

Option A


B.

Option B


C.

Option C


D.

Option D


E.

Option E





B.
  

Option B



Refer to the exhibit Which single security feature is recommended to provide Network Access Control in the enterprise?


A.

MAB


B.

802.1X


C.

WebAuth


D.

port security sticky MAC





B.
  

802.1X



Where is radio resource management performed in a cisco SD-access wireless solution?


A.

DNA Center


B.

control plane node


C.

wireless controller


D.

Cisco CMX





C.
  

wireless controller



Explanation: Fabric wireless controllers manage and control the fabric-mode APs using the same general model as the traditional local-mode controllers which offers the same operational advantages such as mobility control and radio resource management. A significant difference is that client traffic from wireless endpoints is not tunnelled from the APs to the wireless controller. Instead, communication from wireless clients is encapsulated in VXLAN by the fabric APs which build a tunnel to their first-hop fabric edge node. Wireless traffic it tunneled to the edge nodes as the edge nodes provide fabric services such as the Layer 3 Anycast Gateway, policy, and traffic enforcement.

What is a benefit of a virtual machine when compared with a physical server?

 

 


A.

Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.


B.

Virtual machines increase server processing performance


C.

The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines.


D.

Deploying a virtual machine is technically less complex than deploying a physical server.





A.
  

Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.




Page 9 out of 84 Pages
Previous