Go Back on 350-401 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-401 Practice Test


Page 35 out of 168 Pages

Topic 1: Exam Pool A

Which measurement is used from a post wireless survey to depict the cell edge of the access points?


A.

SNR


B.

Noise


C.

RSSI


D.

CCI





A.
  

SNR



Explanation: Coverage defines the ability of wireless clients to connect to a wireless AP with a signal strength and quality high enough to overcome the effects of RF interference. The edge of the coverage for an AP is based on the signal strength and SNR measured as the client device moves away from the AP.

The signal strength required for good coverage varies dependent on the specific type of client devices and applications on the network.

To accommodate the requirement to support wireless Voice over IP (VoIP), refer to the RF guidelines specified in the Cisco 7925G Wireless IP Phone Deployment Guide. The minimum recommended wireless signal strength for voice applications is -67 dBm and the minimum SNR is 25 dB.

The first step in the analysis of a post site survey is to verify the ‘Signal Coverage’. The signal coverage is measured in dBm. You can adjust the color-coded signal gauge to your minimum-allowed signal level to view areas where there are sufficient and insufficient coverage. The example in Figure 8 shows blue, green, and yellow areas in the map have signal coverage at -67 dBm or better. The areas in grey on the coverage maps have deficient coverage. Source from Cisco:

https://www.cisco.com/c/en/us/td/docs/wireless/technology/vowlan/troubleshooting/vowlan_troubleshoot/8_Site_Survey_RF_Design_Valid.html

How is Layer 3 roaming accomplished in a unified wireless deployment?


A.

An EoIP tunnel is created between the client and the anchor controller to provide seamless connectivity as the client is associated with the new AP.


B.

The client entry on the original controller is passed to the database on the new controller.


C.

The new controller assigns an IP address from the new subnet to the client


D.

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.





D.
  

The client database on the original controller is updated the anchor entry, and the new controller database is updated with the foreign entry.



Which features does Cisco EDR use to provide threat detection and response protection?


A.

containment, threat intelligence, and machine learning


B.

firewalling and intrusion prevention


C.

container-based agents


D.

cloud analysis and endpoint firewall controls





B.
  

firewalling and intrusion prevention



An engineer runs the code against an API of Cisco DMA Center, and the platform returns this output What does the response indicate?


A.

The authentication credentials are incorrect


B.

The URl string is incorrect


C.

The Cisco DNA Center API port is incorrect


D.

The HTTP method is incorrect





D.
  

The HTTP method is incorrect



Explanation: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status

What is a consideration when designing a Cisco SD-Access underlay network?


A.

End user subnets and endpoints are part of the underlay network.


B.

The underlay switches provide endpoint physical connectivity for users.


C.

Static routing is a requirement,


D.

It must support IPv4 and IPv6 underlay networks





B.
  

The underlay switches provide endpoint physical connectivity for users.



Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sdadesign-guide.html#Underlay


Page 35 out of 168 Pages
Previous