Big Halloween Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

350-401 Questions and Answers

Question # 6

Which solution should be used in a high-density wireless environment to increase bandwidth for each user?

A.

Increase antenna size.

B.

Increase the cell size of each AP.

C.

Increase the mandatory minimum data rate.

D.

Increase TX power.

Full Access
Question # 7

Full Access
Question # 8

Which method is used by an AP to join HA controllers and is configured in NVRAM?

A.

Primary/Secondary- Tertiary/Backup

B.

stored WLC information

C.

DNS

D.

IP Helper Addresses

Full Access
Question # 9

What is the API keys option for REST API authentication?

A.

a credential that is transmitted unencrypted

B.

one-time encrypted token

C.

a username that is stored in the local router

D.

a predetermined string that is passed from client to server.

Full Access
Question # 10

Which two sources cause interference for Wi-Fi networks? (Choose two.)

A.

incandescent lights

B.

DECT 6.0 cordless phone

C.

mirrored wall

D.

fish tank

E.

900MHz baby monitor

Full Access
Question # 11

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Full Access
Question # 12

Which method ensures the confidentiality of data exchanged over a REST API?

A.

Use TLS to secure the underlying HTTP session.

B.

Use me POST method Instead or URL-encoded GET to pass parameters.

C.

Deploy digest-based authentication to protect the access to the API.

D.

Encode sensitive data using Base64 encoding.

Full Access
Question # 13

Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?

A.

All devices integrating with ISE

B.

selected individual devices

C.

all devices in selected sites

D.

all wired devices

Full Access
Question # 14

Which action is a LISP Map Resolver responsible for?

A.

forwarding user data traffic

B.

accepting map-request messages from ITRs

C.

finding EID-to-RLOC mappings

D.

accepting registration requests from ETRs

Full Access
Question # 15

What is the base unit of definition in YANG?

A.

module

B.

include statement

C.

stanza

D.

node

Full Access
Question # 16

Which exhibit displays a valid JSON file?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 17

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Full Access
Question # 18

Drag and drop the characteristics from the left onto the orchestration tool classifications on the right.

Full Access
Question # 19

An engineer must create a script to append and modify device entries in a JSON-formatted file. The script must work as follows:

Until interrupted from the keyboard, the script reads in the hostname of a device, its management IP address, operating system type, and CLI remote access protocol.

After being interrupted, the script displays the entered entries and adds them to the JSON-formatted file, replacing existing entries whose hostname matches.

The contents of the JSON-formatted file are as follows

Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.

Full Access
Question # 20

Refer to the exhibit. Which Python snippet stores the data structure of the device in JSON format?

A.

A close up of a text AI-generated content may be incorrect.

B.

A close up of a logo AI-generated content may be incorrect.

C.

A close up of a text AI-generated content may be incorrect.

D.

A black text on a white background AI-generated content may be incorrect.

Full Access
Question # 21

What is the data policy in a Cisco SD-WAN deployment?

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay

B.

set of statements that defines how data is forwarded based on IP pocket information and specific VPNs

C.

detailed database mapping several kinds of addresses with their corresponding location

D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay

Full Access
Question # 22

When a wireless client roams between two different wireless controllers, a network connectivity outage is experience for a period of time. Which configuration issue would cause this problem?

A.

Not all of the controllers in the mobility group are using the same mobility group name.

B.

All of the controllers within the mobility group are using the same virtual Interface IP address.

C.

Not all of the controllers within the mobility group are using the same virtual interface IP address.

D.

All of the controllers in the mobility group are using the same mobility group name

Full Access
Question # 23

Drag anti drop the characteristics from the ten onto the configuration models on the right.

Full Access
Question # 24

Which technology is the Cisco SD-Access control plane based on?

A.

LISP

B.

CTS

C.

SGT

D.

VRF

Full Access
Question # 25

Which technology reduces the implementation of STP and leverages both unicast and multicast?

A.

VLAN

B.

VXLAN

C.

VPC

D.

VSS

Full Access
Question # 26

Refer to the exhibit Which command set is required on router R1 to allow the network administrator to authenticate via RADIUS'?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 27

What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process?

A.

broadcast discover request

B.

join request to all the WLCs

C.

unicast discovery request to each WLC

D.

Unicast discovery request to the first WLS that resolves the domain name

Full Access
Question # 28

Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

A.

Device(config)# netconf lock-time 500

B.

Device(config)# netconf max-message 1000

C.

Device(config)# no netconf ssh acl 1

D.

Device(config)# netconf max-sessions 100

Full Access
Question # 29

In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

A.

advertisement of network prefixes and their attributes

B.

configuration of control and data policies

C.

gathering of underlay infrastructure data

D.

delivery of crypto keys

E.

segmentation and differentiation of traffic

Full Access
Question # 30

Full Access
Question # 31

Full Access
Question # 32

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Full Access
Question # 41

Full Access
Question # 42

Full Access
Question # 43

Full Access
Question # 44

Full Access
Question # 45

Full Access
Question # 46

Full Access
Question # 47

Full Access
Question # 48

Full Access
Question # 49

Full Access
Question # 50

Full Access
Question # 51

Full Access
Question # 52

Full Access
Question # 53

Full Access
Question # 54

OR

Full Access
Question # 55

Full Access
Question # 56

Full Access
Question # 57

Full Access