Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

350-101 Questions and Answers

Question # 6

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Full Access
Question # 7

Refer to the exhibit.

A network administrator is working on a WLC to enable user access for contractor desktops using WPA2-Enterprise using EAP-TTLS. The administrator verified the external authentication configuration and now must test network connectivity. Which code snippet must be added to the box in the code to complete the configuration on the WLC that supports authentication with an external server?

A.

aaa group server radius RADIUS-GRP

B.

aaa group server aaa RADIUS-GRP

C.

aaa server group server radius RADIUS-GRP

D.

aaa server group server radius RADIUS-GRP

Full Access
Question # 8

Which new attribute does IEEE 802.11ax introduce when used in wireless local area networks?

A.

60 GHz utilization

B.

Wi-Fi multimedia

C.

OFDMA

D.

MIMO

Full Access
Question # 9

Refer to the exhibit.

import requests

import json

API_ENDPOINT = "https://your-api-server.com/api/v1/devices/wireless"

AUTH_TOKEN = "YOUR_SECRET_API_TOKEN"

headers = {

"Accept": "application/json",

"Authorization": f"Bearer {AUTH_TOKEN}"

}

print("Fetching wireless inventory from the API...")

try:

response = requests.get(API_ENDPOINT, headers=headers, timeout=10)

response.raise_for_status()

wireless_inventory_list = response.json()

print("Successfully retrieved and parsed device data.\n")

print("--- Wireless Device Summary ---")

if isinstance(wireless_inventory_list, list) and wireless_inventory_list:

for device in wireless_inventory_list:

mac = device.get("macAddress", "N/A")

ip = device.get("ipAddress", "N/A")

print(f"Device Found - > MAC: {mac}, IP: {ip}")

else:

print("No wireless devices were found in the inventory.")

except requests.exceptions.RequestException as e:

print(f"Error during API request: {e}")

except json.JSONDecodeError:

print("Error: Failed to parse the response from the API. It is not valid JSON.")

A Cisco engineer is analyzing how a dictionary interacts with key-value pairs in a Python script that processes device records collected from a wireless controller. The engineer reviews the construction of the script to interpret the sequence used for data extraction. Which element performs the interaction within the script?

A.

pop operation

B.

import function

C.

get() method

D.

format expression

Full Access
Question # 10

An IT team is deploying Meraki APs at a remote branch and must ensure that they are automatically assigned to the correct network in the Meraki dashboard. The branch is scheduled to receive 20 new APs, and site connectivity to headquarters was set up. Before shipping the APs, the team must make sure that each one is claimed by the intended network for management and monitoring. Which deployment action must they take before physically connecting the APs?

A.

Activate mesh networking mode for all the new APs before installation.

B.

Add the AP serial numbers to the required network within the Meraki dashboard.

C.

Preconfigure SSID names and VLAN tags on the local page of each AP in the Meraki dashboard.

D.

Create a separate DHCP scope for all the new APs on the local server.

Full Access
Question # 11

Refer to the exhibit. A startup company has recently moved to new offices and performed a full network refresh. The application development team requested a high-speed reliable wireless network to use for testing real-time applications. Although, the wireless network is Wi-Fi 7 enabled, the wireless clients are connecting using lower speeds. Which configuration must be applied on the WLC to increase throughput?

A.

security wpa3 akm sae ext-key

B.

security wpa wpa2 wpa3 aes512

C.

security wpa wpa2 wpa3 tkip512

D.

security wpa wpa2 ciphers gcmp256

Full Access
Question # 12

Refer to the exhibit.

An engineer must configure wireless guest networking for a deployment at site A, which requires support for guest VLAN assignment and assignment for wlan guest-network 20. The controller will provide network segregation and restrict access to internal resources. Based on the configuration commands, which action meets the requirements?

A.

Establish a mesh bridge connection for the guest VLAN and assign logical interface for isolation.

B.

Create a policy profile for the guest VLAN and a policy tag to map the WLAN to the policy profile.

C.

Assign a policy tag to map the to WLAN and assign a physical interface for isolation.

D.

Implement the Spanning Tree Protocol and assign an AP group name.

Full Access
Question # 13

Which Cisco technology leverages machine learning methods and a cloud learning platform that helps to identify critical issues?

A.

Catalyst Center Assurance

B.

Network Services

C.

Catalyst Center LLM Insights

D.

AI Network Analytics

Full Access
Question # 14

A network engineer has been tasked with migrating the management mode of a Cisco 9176 AP named "Cisco-AP053540555" in a large enterprise wireless deployment. The AP is currently managed by a Cisco Catalyst 9800 Series WLC, but the organization is transitioning to Meraki cloud management for centralized control and monitoring. To complete this migration, the engineer needs to change the AP's management mode to Meraki with force and noprompt to skip validations using the CLI on the wireless controller. What command must the engineer use?

A.

management meraki force noprompt mode

B.

ap management mode meraki force noprompt

C.

ap management meraki force noprompt mode

D.

management-mode meraki force noprompt

Full Access
Question # 15

Which hierarchy in a YANG data modeling approach describes a relationship in the context of NETCONF device configuration?

A.

object and attribute model

B.

child and parent structure

C.

hub and spoke model

D.

tree and leaf-based structure

Full Access
Question # 16

Which feature does bridge mode provide in a Cisco wireless mesh architecture?

A.

It enables point-to-point communication between network segments.

B.

It switches all traffic passing through the AP to 2.4 GHz by default.

C.

It adjusts RF transmit power on any neighbor nodes.

D.

It communicates with WAN edge by default.

Full Access
Question # 17

An organization must manage ongoing firmware updates for redundant controllers in the network. They will use Cisco Catalyst Center for deployment and visibility. The current environment uses centralized and distributed management approaches. Automation and reporting are critical to minimize operational workload. Which method must be used to manage structured update processes and monitor progress throughout the update cycle?

A.

inventory snapshots from hardware report

B.

software templates

C.

software image management workflows

D.

lifecycle workflow

Full Access
Question # 18

Which solution enables a seamless user experience when roaming in a wireless network?

A.

static VLAN policy

B.

optimized roaming

C.

redundant RF profile

D.

fast transition

Full Access
Question # 19

What is the main benefit of using AI Enhanced RRM on the Cisco Catalyst 9800 wireless controller?

A.

It is an automatic tuning tool that is used to adjust RF parameters based on static thresholds.

B.

It focuses on increasing the transmit power of access points to maximize coverage regardless of interference.

C.

It disables dynamic channel assignment and power control to maintain a fixed wireless environment for stability.

D.

It uses machine learning and cloud analytics to proactively optimize RF parameters.

Full Access
Question # 20

Refer to the exhibit. A network engineer must create a PSK WLAN that will be anchored to the DMZ. After this WLAN is created, users cannot connect to it. Based on the output from the RA trace, which action must the engineer take to resolve the issue?

A.

Disable fast transition 802.11r on the WLAN.

B.

Configure matching passwords on the client and the WLAN.

C.

Remove the anchor WLC from the mobility group.

D.

Configure matching WLANs on the foreign and the anchor.

Full Access
Question # 21

What is a characteristic of gain in wireless antenna design?

A.

Scale used for calculating system loss

B.

Checksum figure appended to signal blocks

C.

Amount of increased energy sent toward a specific direction

D.

Standard temperature tolerance during wireless operation

Full Access
Question # 22

What defines device sensitivity in a wireless environment?

A.

capability to process the signal

B.

detection of redundant gateways

C.

synchronization of beacon intervals

D.

implementation of key refresh schedules

Full Access
Question # 23

Which Cisco Ultra-Reliable Wireless Backhaul process enables devices to establish a reliable connection with the next AP along their path before losing connectivity to the current one in a wireless network during roaming?

A.

Open roaming

B.

Fast client handoff

C.

802.11v high speed roaming

D.

Make-before-break handover logic

Full Access
Question # 24

A network administrator at a marketing company manages a Cisco Catalyst 9800 Series Wireless Controller running Cisco IOS XE 17.x. The WLAN named XYZ-Guest is set up for visitors, and the administrator wants to implement a web authentication (WebAuth) portal using an external server to manage guest access. To ensure seamless and secure guest authentication, the controller must be configured to use an external WebAuth server for the WLAN. The administrator must configure the XYZ-Guest WLAN to use an external WebAuth server with a parameter map named webauth-ext. Which set of Cisco IOS XE commands must be used?

A.

wireless wlan XYZ-Guestsecurity web-auth external webauth-ext

B.

wireless wlan XYZ-Guest 2 XYZ-Guestparameter-map webauth-ext

C.

wlan XYZ-Guest 2parameter external security-map webauth-ext

D.

wlan XYZ-Guest 2 XYZ-Guestsecurity web-auth parameter-map webauth-ext

Full Access
Question # 25

Which process enables seamless Layer 2 handoff in a wireless network during roaming?

A.

increased beacon interval setting

B.

optimized roaming

C.

fast BSS transition protocol

D.

deferred probe response technique

Full Access
Question # 26

What happens when a radio wave bends around objects?

A.

absorption

B.

diffusion

C.

reflection

D.

diffraction

Full Access
Question # 27

Exhibit:

Refer to the exhibit. An organization wants to use Cisco Spaces for location analytics, and an engineer is setting up the Cisco Catalyst 9800 WLC to send location data. The Spaces connector has already been configured and is operational on the WLC. The engineer must now configure the controller to forward telemetry data to the correct Spaces cloud endpoint using TLS to complete the integration. Which CLI command must be added to the box in the code?

A.

profile spaces-profile ip address 198.51.100.10 receiver tls-native

B.

receiver protocol tls-native profile spaces-profile ip address 198.51.100.10 57555

C.

receiver ip address 198.51.100.10 57555 protocol tls-native profile spaces-profile

D.

profile spaces-profile receiver 198.51.100.10 57555 protocol tls-native

Full Access
Question # 28

Which feature does a high-gain patch antenna impart to a wireless signal?

A.

single narrow frequency use

B.

partial overlap of frequency bands

C.

focused beam in a flat area

D.

alternating direction with elevation

Full Access
Question # 29

Refer to the exhibit.]

An engineer is setting up a new WLC in a branch office. The IT security policy states that all management access must use encrypted protocols, administrators will connect remotely, and network scans will be run to check for any noncompliant management protocol exposure. Which action must the engineer take to achieve the required management access policy?

A.

Permit only HTTP, Telnet, and SSH across all VLANs for 10.10.1.0/24.

B.

Enable Telnet, SSH, and HTTPS across the management and guest interfaces.

C.

Permit console access for 10.10.1.0/24 only with HTTP disabled.

D.

Enable HTTPS and SSH, and disable HTTP and Telnet on the WLC.

Full Access
Question # 30

What is a benefit of applying TACACS authentication for device access?

A.

static user grouping without role differentiation

B.

fragmented statistics across controllers and devices

C.

streamlined administrator access across platforms

D.

single user for device and network access

Full Access