Our Cisco 350-401 dumps are key to get success. More than 80000+ success stories.
Clients Passed Cisco 350-401 Exam Today
Passing score in Real Cisco 350-401 Exam
Questions were from our given 350-401 dumps
When is an external antenna used inside a building?
A. only when using Mobility Express
B. when it provides the required coverage
C. only when using 2 4 GHz
D. only when using 5 GHz
A network administrator has designed a network with two multilayer switches on thedistribution layer, which act as default gateways for the end hosts. Which two technologiesallow every end host in a VLAN to use both gateways? (Choose two)
How does Cisco Trustsec enable more flexible access controls for dynamic networkingenvironments and data centers?
A. uses flexible NetFlow
B. assigns a VLAN to the endpoint
C. classifies traffic based an the contextual identity of the endpoint rather than its IPaddress
D. classifies traffic based on advanced application recognition
Which AP mode allows an engineer to scan configured channels for rogue access points?
“HTTP/1.1 204 content” is returned when cur –I –x delete command is issued. Whichsituation has occurred?
A. The object could not be located at the URI path.
B. The command succeeded in deleting the object
C. The object was located at the URI, but it could not be deleted.
D. The URI was invalid
A server running Linux is providing support for virtual machines along with DNS and DHCPservices for a small business. Which technology does this represent?
B. Type 1 hypervisor
C. hardware pass-thru
D. Type 2 hypervisor
Which technology provides a secure communication channel for all traffic at Layer 2 of theOSI model?
D. Cisco Trustsec
Which two operational models enable an AP to scan one or more wireless channels forrouge access points and at the same time provide wireless services to clients? (Choosetwo.)
A. Rouge detector
How is MSDP used to interconnect multiple PIM-SM domains?
A. MSDP depends on BGP or multiprotocol BGP for mterdomam operation
B. MSDP SA request messages are used to request a list of active sources for a specificgroup
C. SDP allows a rendezvous point to dynamically discover active sources outside of itsdomain
D. MSDP messages are used to advertise active sources in a domain
Which two methods are used to reduce the AP coverage area? (Choose two)
A. Reduce channel width from 40 MHz to 20 MHz
B. Disable 2.4 GHz and use only 5 GHz.
C. Reduce AP transmit power.
D. Increase minimum mandatory data rate
E. Enable Fastlane
What is the differences between TCAM and the MAC address table?
A. The MAC address table is contained in CAM ACL and QoS information is stored inTCAM
B. The MAC address table supports partial matches. TCAM requires an exact match
C. Router prefix lookups happens in CAM. MAC address table lookups happen in TCAM.
D. TCAM is used to make Layer 2 forwarding decisions CAM is used to build routing tables
What is the recommended MTU size for a Cisco SD-Access Fabric?
In an SD-Access solution what is the role of a fabric edge node?
A. to connect external Layer 3- network to the SD-Access fabric
B. to connect wired endpoint to the SD-Access fabric
C. to advertise fabric IP address space to external network
D. to connect the fusion router to the SD-Access fabric
At which Layer does Cisco DNA Center support REST controls?
A. EEM applets or scripts
B. Session layer
C. YMAL output from responses to API calls
D. Northbound APIs
What is a benefit of a virtual machine when compared with a physical server?
A. Multiple virtual servers can be deployed on the same physical server without having tobuy additional hardware.
B. Virtual machines increase server processing performance.
C. The CPU and RAM resources on a virtual machine cannot be affected by other virtualmachines.
D. Deploying a virtual machine is technically less complex than deploying a physical server.
What is a fact about Cisco EAP-FAST?
A. It does not require a RADIUS server certificate.
B. It requires a client certificate.
C. It is an IETF standard.
D. It operates in transparent mode.
What are two benefits of virtual switching when compared to hardware switching? (Choosetwo.)
A. increased MTU size
B. hardware independence
C. VM-level isolation
D. increased flexibility
E. extended 802.1Q VLAN range
Under which network conditions is an outbound QoS policy that is applied on a router WANinterface most beneficial?
A. under interface saturation condition
B. under network convergence condition
C. under all network condition
D. under traffic classification and marking conditions.
which features does Cisco EDR use to provide threat detection and response protection?
A. containment, threat intelligence, and machine learning
B. firewalling and intrusion prevention
C. container-based agents
D. cloud analysis and endpoint firewall controls
What is the centralized control policy in a Cisco SD-WAN deployment?
A. list of ordered statements that define user access policies
B. set of statements that defines how routing is performed
C. set of rules that governs nodes authentication within the cloud
D. list of enabled services for all nodes within the cloud
In cisco SD_WAN, which protocol is used to measure link quality?
Which two operations are valid for RESTCONF? (Choose two.)
Which protocol does REST API rely on to secure the communication channel?
What is a characteristic of a next-generation firewall?
A. only required at the network perimeter
B. required in each layer of the network
C. filters traffic using Layer 3 and Layer 4 information only
D. provides intrusion prevention
How does the RIB differ from the FIB?
A. The RIB is used to create network topologies and routing tables. The FIB is a list ofroutes to particular network destinations.
B. The FIB includes many routes a single destination. The RIB is the best route to a singledestination.
C. The RIB includes many routes to the same destination prefix. The FIB contains only thebest route
D. The FIB maintains network topologies and routing tables. The RIB is a Iist of routes toparticular network destinations.
Which encryption hashing algorithm does NTP use for authentication?
What is one difference between saltstack and ansible?
A. SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereasAnsible uses a Telnet connection
B. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server onthe box
C. SaltStack is constructed with minion, whereas Ansible is constructed with YAML
D. SaltStack uses SSH to interact with Cisco devices, whereas Ansible uses an event bus
Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLANenvironment?
A. switch fabric
D. host switch
What does Call Admission Control require the client to send in order to reserve thebandwidth?
A. SIP flow information
B. Wi-Fi multimedia
C. traffic specification
D. VoIP media session awareness
What is a benefit of data modeling languages like YANG?
A. They enable programmers to change or write their own application within the deviceoperating system.
B. They create more secure and efficient SNMP OIDs.
C. They make the CLI simpler and more efficient.
D. They provide a standardized data structure, which results in configuration scalability andconsistency.
What is the purpose of the LISP routing and addressing architecture?
A. It creates two entries for each network node, one for Its identity and another for itslocation on the network.
B. It allows LISP to be applied as a network visualization overlay though encapsulation.
C. It allows multiple Instances of a routing table to co-exist within the same router.
D. It creates head-end replication used to deliver broadcast and multicast frames to theentire network.
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is theSNR?
Which function in handled by vManage in the cisco SD-WAN fabric?
A. Establishes BFD sessions to test liveliness of links and nodes.
B. Distributes polices that govern data forwarding.
C. Performs remote software upgrades for WAN Edge vSmart and vBond.
D. Establishes iPsec tunnels with nodes
What is the data policy in a Cisco SD-WAN deployment?
A. list of ordered statements that define node configurations and authentication used withinthe SD-WAN overlay
B. Set of statements that defines how data is forwarded based on IP packet informationand specific VPNs
C. detailed database mapping several kinds of addresses with their corresponding location
D. group of services tested to guarantee devices and links liveliness within the SD-WANoverlay
Which two threats does AMP4E have the ability to block? (Choose two.)
C. Microsoft Word macro attack
D. SQL injection
E. email phishing
What is the difference between CEF and process switching?
A. CEF processes packets that are too complex for process switching to manage.
B. CEF is more CPU-intensive than process switching.
C. CEF uses the FIB and the adjacency table to make forwarding decisions, whereasprocess switching punts each packet.
D. Process switching is faster than CEF.
Which congestion queuing method on Cisco IOS based routers uses four static queues?
C. weighted fair
D. low latency