Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-401 Questions and Answers

Question # 6

Full Access
Question # 7

Full Access
Question # 8

Full Access
Question # 9

Full Access
Question # 10

Full Access
Question # 11

Which feature is needed to maintain the IP address of a client when an inter-controller Layer 3 roam is performed between two WLCs that are using different mobility groups?

A.

interface groups

B.

RF groups

C.

AAA override

D.

auto anchor

Full Access
Question # 12

What is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

A.

EIRP

B.

dBi

C.

RSSI

D.

SNR

Full Access
Question # 13

Which Cisco WLC feature allows a wireless device to perform a Layer 3 roam between two separate controllers without changing the client IP address?

A.

mobile IP

B.

mobility tunnel

C.

LWAPP tunnel

D.

GRE tunnel

Full Access
Question # 14

In a campus network design, what are two benefits of using BFD for failure detection'? (Choose two.)

A.

BFD speeds up routing convergence time

B.

BFD provides path failure detection in less than a second

C.

BFD provides fault tolerance by enabling multiple routers to appear as a single virtual router

D.

BFD is an efficient way to reduce memory and CPU usage

E.

BFD enables network peers to continue forwarding packets in the event of a restart

Full Access
Question # 15

Refer to the exhibit. Which result does the python code achieve?

A.

The code encrypts a base64 decrypted password.

B.

The code converts time to the "year/month/day" time format.

C.

The code converts time to the yyyymmdd representation.

D.

The code converts time to the Epoch LINUX time format.

Full Access
Question # 16

Which characteristic applies to Cisco SD-Access?

A.

It uses dynamic routing the discover and provision access switches.

B.

It uses VXLAN for the control plane

C.

It uses VXLAN for the data plane

D.

It uses dynamic routing to discover and provision border switches

Full Access
Question # 17

Which NGFW mode block flows crossing the firewall?

A.

Passive

B.

Tap

C.

Inline tap

D.

Inline

Full Access
Question # 18

What is a benefit of data modeling languages like YANG?

A.

They enable programmers to change or write their own application within the device operating system.

B.

They create more secure and efficient SNMP OIDs.

C.

They make the CLI simpler and more efficient.

D.

They provide a standardized data structure, which results in configuration scalability and consistency.

Full Access
Question # 19

How does SSO work with HSRP to minimize network disruptions?

A.

It enables HSRP to elect another switch in the group as the active HSRP switch.

B.

It ensures fast failover in the case of link failure.

C.

It enables data forwarding along known routes following a switchover, white the routing protocol reconverges.

D.

It enables HSRP to failover to the standby RP on the same device.

Full Access
Question # 20

What does the statement print(format(0.8, \0%')) display?

A.

80%

B.

8.8%

C.

.08%

D.

8%

Full Access
Question # 21

What are two device roles in Cisco SD-Access fabric? (Choose two.)

A.

core switch

B.

vBond controller

C.

edge node

D.

access switch

E.

border node

Full Access
Question # 22

In a wireless network environment, which measurement compares the received signal to the background noise?

A.

free space path loss

B.

link power budget

C.

fading

D.

SNR

Full Access
Question # 23

Drag and drop the snippets onto the blanks within the code to construct a script that brings up the failover Ethernet port if the primary port goes down and also shuts down the failover port when the primary returns to service. Not all options are used.

Full Access
Question # 24

Drag and drop the code snippets from the bottom onto the blanks in the Python script to print the device model to the screen and write JSON data to a file. Not all options are used

Full Access
Question # 25

Which message type is valid for IGMPv3?

A.

leave group

B.

hello

C.

graft

D.

source-specific membership report

Full Access
Question # 26

What does a next-generation firewall that is deployed at the data center protect against?

A.

signature-based malware

B.

DMZ web server vulnerabilities

C.

zero-day attacks

D.

DDoS

Full Access
Question # 27

In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?

A.

Layer 3

B.

inter-xTR

C.

auto anchor

D.

fast roam

Full Access
Question # 28

Which two operations are valid for RESTCONF? (Choose two)

A.

PULL

B.

ADD

C.

HEAD

D.

REMOVE

E.

GET

F.

PUSH

Full Access
Question # 29

Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.

Full Access
Question # 30

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

A.

restarted

B.

failed

C.

stopped

D.

successful

Full Access
Question # 31

Which AP mode allows an engineer to scan configured channels for rogue access points?

A.

sniffer

B.

monitor

C.

bridge

D.

local

Full Access
Question # 32

What is one characteristic of Cisco Catalyst Center (formerly DNA Center) and vManage northbound APIs?

A.

They implement the NETCONF protocol.

B.

They push configuration changes down to devices.

C.

They exchange XML-formatted content.

D.

They implement the RESTCONF protocol.

Full Access
Question # 33

Which action reduces sticky clients in dense RF environments?

A.

Decrease radio channel widths to 40 MHz.

B.

Increase the mandatory minimum data rates.

C.

Decrease the mandatory minimum data rates.

D.

Increase radio channel widths to 160 MHz.

Full Access
Question # 34

Which device makes the decision for a wireless client to roam?

A.

wireless client

B.

Wireless LAN controller

C.

access point

D.

WCS location server

Full Access
Question # 35

A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?

A.

intra-VLAN

B.

inter-controller

C.

intra-controller

D.

inter-subnet

Full Access
Question # 36

Which tag defines the roaming domain and properties of an AP deployment?

A.

RF tag

B.

policy tag

C.

site tag

D.

AP tag

Full Access
Question # 37

What is a benefit of YANG modules?

A.

tightly coupled models with encoding to improve performance

B.

easier multivendor interoperability provided by common or industry models

C.

avoidance of ecosystem fragmentation by having fixed modules that cannot be changed

D.

single protocol and model coupling to simplify maintenance and support

Full Access
Question # 38

What is the purpose of data modeling languages?

A.

to describe a data schema convertible into any data encoding format

B.

to specify algorithms necessary to decode binary-encoded protocol data units

C.

to translate encoded data for interoperability between different CPU architectures

D.

to provide a framework to describe data flow patterns in networks

Full Access
Question # 39

What is one main REST security design principle?

A.

separation of privilege

B.

password hashing

C.

confidential algorithms

D.

OAuth

Full Access
Question # 40

Drag and drop the DHCP messages that are exchanged between a client and an AP into the order they are exchanged on the right.

Full Access
Question # 41

Drag and drop the REST API authentication methods from the left onto their descriptions on the right.

Full Access
Question # 42

Which tag defines the properties to be applied to each specific WLAN?

A.

RF tag

B.

policy tag

C.

AP tag

D.

site tag

Full Access
Question # 43

Which configuration enables a Cisco router lo send information to a TACACS+ server for individual EXEC commands associated with privilege level 15?

A.

Router(config)# aaa accounting commands 15 default start-stop group tacacs+

B.

Router(config)# aaa authorization exec default group tacacs+

C.

Router(config)# aaa authorization commands 15 default group tacacs+

D.

Router(config)# aaa accounting exec default start-stop group tacacs+

Full Access
Question # 44

Drag and drop the automation characteristics from the left onto the appropriate tools on the right. Not all options are used.

Full Access
Question # 45

Which multicast operational mode sends a prune message to the source when there are no connected members or downstream neighbors?

A.

PIM sparse mode

B.

PIM dense mode

C.

IGMPv3

D.

IGMPv2

Full Access
Question # 46

Which two mechanisms are used with OAuth 2.0 for enhanced validation? (Choose two.)

A.

custom headers

B.

authentication

C.

authorization

D.

request management

E.

accounting

Full Access
Question # 47

To support new clients in the environment, an engineer must enable Fast Transition on the corporate WLAN. Which command must be applied on a Cisco Catalyst 9800 Series WLC?

A.

security ft adaptive

B.

security wpa akm dotlx

C.

security wpa akm psk

D.

security wpa akm ft psk

Full Access
Question # 48

Based on the configuration in this WLAN security setting,Which method can a client use to authenticate to the network?

A.

text string

B.

username and password

C.

certificate

D.

RADIUS token

Full Access
Question # 49

Drag and drop the characteristics of Cisco Catalyst SD-WAN from the left onto the right. Not all options are used.

Full Access
Question # 50

An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is not disrupted in the event of a hardware failure?

A.

HSRPv1

B.

GLBP

C.

VRRP

D.

HSRPv2

Full Access
Question # 51

Which Cisco Catalyst SD-WAN component is responsible for distributing data plane traffic policies?

A.

vBond

B.

vManage

C.

vSmart

D.

WAN edge

Full Access
Question # 52

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Full Access
Question # 53

An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down. Which script must the engineer apply?

A.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-1-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE_OSPF_DEBUG

B.

event manager applet ENABLEOSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5, Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "debug ip ospf event"action 2.0 cli command "debug ip ospf adj"action 3.0 syslog priority informational msg "ENABLE JDSPF_DEBUG"

C.

event manager apple! ENABLE OSPFDEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 5. Nbr 1.1.1.1 on SerialO/0 from LOADING to FULL"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPFJ} EBUG"

D.

event manager applet ENABLE_OSPF_DEBUGevent syslog pattern "%OSPF-5-ADJCHG: Process 6. Nbr 1.1.1.1 on SerialO/0 from FULL to DOWN"action 1.0 cli command "enable"action 2.0 cli command "debug ip ospf event"action 3.0 cli command "debug ip ospf adj"action 4.0 syslog priority informational msg "ENABLE_OSPF_DEBUG'*

Full Access
Question # 54

What is the function of the statement "import actions" in this script?

A.

It imports the functions that are not available natively in Python

B.

It imports the functions of a third-party module

C.

It imports a Python module

D.

It imports an external reference

Full Access
Question # 55

Which method does FastLocate use to collect location-based information?

A.

RFID

B.

client probing

C.

beacons

D.

data packets

Full Access
Question # 56

What is one primary REST security design principle?

A.

fail-safe defaults

B.

password hash

C.

adding a timestamp in requests

D.

OAuth

Full Access
Question # 57

In a Cisco SD-Access network architecture, which access layer cabling design is optimal for the underlay network?

A.

Switches are cross-finned at the same layer and have a single connection to each upstream distribution device

B.

Switches are connected to each upstream distribution and core device.

C.

Switches are connected to each upstream distribution device.

D.

Switches are cross-linked to devices at the same layer and at the upstream and downstream devices.

Full Access
Question # 58

Which solution supports end-to-end line-rate encryption between two sites?

A.

TrustSec

B.

MACsec

C.

IPsec

D.

GRE

Full Access
Question # 59

Why would a network engineer configure an AP in SE-Connect mode?

A.

to redirect WLAN traffic to an endpoint for protocol analysis

B.

to monitor the VLAN traffic for rogue APs

C.

to connect the wired LAN with the wireless infrastructure

D.

to analyze the RF spectrum surrounding the AP

Full Access
Question # 60

Full Access
Question # 61

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Full Access
Question # 62

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a dient and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Full Access
Question # 63

What is a characteristic of the Cisco Catalyst Center (formerly DNA Center) Template Editor feature?

A.

It facilitates software upgrades to network devices from a central point.

B.

It facilitates a vulnerability assessment of the network devices.

C.

It uses a predefined configuration through parameterized elements or variables.

D.

It provides a high-level overview of the health of every network device.

Full Access
Question # 64

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

A.

ISE server

B.

local WLC

C.

RADIUS server

D.

anchor WLC

Full Access
Question # 65

What is a characteristics of a type 1 hypervisor?

A.

It runs on top of the host operating system.

B.

It is preferred for supporting nonproduction workloads.

C.

It has greater latency than a Type 2 hypervisor.

D.

It runs on top of bare metal servers.

Full Access
Question # 66

Full Access
Question # 67

Full Access
Question # 68

Full Access
Question # 69

Full Access
Question # 70

Full Access
Question # 71

Full Access
Question # 72

Full Access
Question # 73

OR

Full Access
Question # 74

Full Access
Question # 75

Full Access
Question # 76

Full Access
Question # 77

Full Access
Question # 78

Full Access
Question # 79

Full Access
Question # 80

Full Access
Question # 81

Full Access
Question # 82

Full Access
Question # 83

Full Access