Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-401 Questions and Answers

Question # 6

What is a client who is running 802.1x for authentication reffered to as?

A.

supplicant

B.

NAC device

C.

authenticate

D.

policy enforcement point

Full Access
Question # 7

A corporate policy mandates that a certificate-based authentication system must be implemented on the wireless infrastructure. All corporate clients will contain a certificate that will be used in conjunction with ISE and user credentials to perform authentication before the clients are allowed to connect to the corporate Wi-Fi. Which authentication key option must be selected to ensure that this authentication can take place?

A.

none

B.

PSK

C.

802.1x

D.

CCKM

Full Access
Question # 8

Which technology reduces the implementation of STP and leverages both unicast and multicast?

A.

VLAN

B.

VXLAN

C.

VPC

D.

VSS

Full Access
Question # 9

Refer to the exhibit. Which result does the python code achieve?

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Full Access
Question # 10

In a wireless network environment, which measurement compares the received signal to the background noise?

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Full Access
Question # 11

Full Access
Question # 12

Full Access
Question # 13

Full Access
Question # 14

Full Access
Question # 15

Full Access
Question # 16

Full Access
Question # 17

Full Access
Question # 18

Full Access
Question # 19

OR

Full Access
Question # 20

Full Access
Question # 21

Full Access
Question # 22

Full Access
Question # 23

Full Access
Question # 24

Full Access
Question # 25

Full Access
Question # 26

Full Access
Question # 27

Full Access
Question # 28

Full Access
Question # 29

Full Access
Question # 30

Full Access
Question # 31

Full Access
Question # 32

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Why would an architect use an OSPF virtual link?

A.

to allow a stub area to transit another stub area

B.

to merge two existing Area 0s through a nonbackbone

C.

to connect two networks that have overlapping private IP address space

D.

to connect a nonbackbone area to Area 0 through another nonbackbone area

Full Access
Question # 41

Which two characteristics apply to Type 1 hypervisors? (Choose two.)

A.

They are widely available to license for free.

B.

They provide a platform for running bare metal operating systems.

C.

They can be used to create and manage virtual storage

D.

They are a software layer that runs on top of a virtual server.

E.

They provide a platform for running guest operating systems.

Full Access
Question # 42

What is the structure of a JSON web token?

A.

header and payload

B.

three parts separated by dots: version, header, and signature

C.

payload and signature

D.

three parts separated by dots: header, payload. and signature

Full Access
Question # 43

Refer to the exhibit An engineer is troubleshooting an issue with non-Wi-Fi interference on the 5-GHz band The engineer has enabled Cisco CleanAir and set the appropriate traps, but the AP does not change the channel when it detects significant interference Which action will resolve the issue?

A.

Enable the Avoid Persistent Non-WiFi Interference option

B.

Disable the Avoid Foreign AP Interference option.

C.

Change the DCA Sensitivity option to High

D.

Enable the Event Driven Radio Resource Management option

Full Access
Question # 44

Which consideration must be made when using BFD in a network design?

A.

BFD requires a FHRP in order to provide sub second host failover.

B.

BFD can be deployed without any IP routing protocols being configured.

C.

NSF and graceful restart must be enabled on all participating routers.

D.

Cisco Express forwarding and IP routing must be enabled on all participating routers.

Full Access
Question # 45

How does SSO work with HSRP to minimize network disruptions?

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Full Access
Question # 46

Which First Hop Redundancy Protocol maximizes uplink utilization and minimizes the amount of configuration that is necessary?

A.

GLBP

B.

HSRP v2

C.

VRRP

D.

HSRP v1

Full Access
Question # 47

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Full Access
Question # 48

What is the base unit of definition in YANG?

A.

module

B.

include statement

C.

stanza

D.

node

Full Access
Question # 49

In a Cisco Mobility Express wireless deployment, which AP takes over if the primary AP fails?

A.

AP with highest IP address

B.

AP with the lowest IP address

C.

AP with highest MAC address

D.

AP with highest controller up time

Full Access
Question # 50

What is a benefit of implementing stateful switchover?

A.

modularity

B.

resiliency

C.

flexibilityD scalability

Full Access