Go Back on 350-401 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

350-401 Practice Test


Page 39 out of 168 Pages

Topic 1: Exam Pool A

Refer to the exhibit.

Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the WLC use as the source for all RADIUS-related traffic?


A.

the interface specified on the WLAN configuration


B.

any interface configured on the WLC


C.

the controller management interface


D.

the controller virtual interface





A.
  

the interface specified on the WLAN configuration



Refer to the Exhibit.

An engineer is installing a new pair of routers in a redundant configuration. When checking on the standby status of each router the engineer notices that the routers are not functioning as expected. Which action will resolve the configuration error?


A.

configure matching hold and delay timers


B.

configure matching key-strings


C.

configure matching priority values


D.

configure unique virtual IP addresses





B.
  

configure matching key-strings



Explanation:
From the output exhibit, we notice that the key-string of R1 is Cisco123! (letter C is in capital) while that of R2 is cisco123!. This causes a mismatch in the authentication so we have to fix their key-strings. key-string [encryption-type] text-string: Configures the text string for the key. The textstring argument is alphanumeric, case-sensitive, and supports special characters.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/security/configuration/guide/b_Cisco_Nexus_9000_Series_NXOS_Security_Configuration_Guide/b_Cisco_Nexus_9000_Series_NXOS_Security_Configuration_Guide_chapter_01111.pdf

Refer to the exhibit.

An engineer configures the BGP adjacency between R1 and R2, however, it fails to establish Which action resolves the issue?


A.

Change the network statement on R1 to 172.16 10.0


B.

Change the remote-as number for 192 168.100.11


C.

Enable synchronization on R1 and R2


D.

Change the remote-as number on R1 to 6500.





D.
  

Change the remote-as number on R1 to 6500.



Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?


A.

threat defense


B.

security services


C.

security intelligence


D.

segmentation





C.
  

security intelligence



Which technology is used as the basis for the cisco sd-access data plane?


A.

IPsec


B.

LISP


C.

VXLAN


D.

802.1Q





C.
  

VXLAN



Explanation: A virtual network identifier (VNI) is a value that identifies a specific virtual network in the data plane.


Page 39 out of 168 Pages
Previous