Surge ahead in 350-401 with gratis VCE resources now featuring the latest questions

Step into the mesmerizing realm of certification, with the 350-401 dumps lighting your path like luminous fireflies in the night. Intricately woven to reflect the diverse melodies of the syllabus, the 350-401 dumps sing a song of practice questions, harmonizing with your learning rhythm. Whether you sway to the structured beats of PDFs or dance to the dynamic tunes of the VCE format, the 350-401 dumps orchestrate a symphony of knowledge. Guiding you through this musical journey, the study guide within the 350-401 dumps elucidates the complex notes, ensuring a flawless performance. Confident in this harmonious blend, our 100% Pass Guarantee stands as our encore.

Carve your path to 350-401 exam success with our expertly designed 350-401 VCE and PDF materials

Question 1:

Which statement about the default QoS configuration on a Cisco switch is true?

A. The Cos value of each tagged packet is modified

B. Port trust is enabled

C. The Port Cos value is 0

D. All traffic is sent through four egress queues

Correct Answer: C


Question 2:

Refer to the exhibit.

SwitchC connects HR and Sales to the Core switch. However, business needs require that no traffic from the Finance VLAN traverse this switch.

Which command meets this requirement?

A. SwitchC(config)#vtp pruning vlan 110

B. SwitchC(config)#vtp pruning

C. SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan add 210,310

D. SwitchC(config)#interface port-channel 1 SwitchC(config-if)#switchport trunk allowed vlan remove 110

Correct Answer: D

From the “show vlan brief” we learn that Finance belongs to VLAN 110 and all VLANs (from 1 to 1005) are allowed to traverse the trunk (port-channel 1). Therefore we have to remove VLAN 110 from the allowed VLAN list with the “switchport trunk allowed vlan remove ” command. The pruning feature cannot do this job as Finance VLAN is active.


Question 3:

Which deployment option of Cisco NQFW provides scalability?

A. clustering

B. Inline tap

C. high availability

D. tap

Correct Answer: C


Question 4:

DRAG DROP

Drag and drop the definitions on the left to their respective technological names on the right.

Select and Place:

Correct Answer:


Question 5:

Refer to the exhibit.

An engineer attempts to configure a trunk between switch SW1 and switch SW2 using DTP, but the trunk does not form.

Which command should the engineer apply to switch SW2 to resolve this issue?

A. switchport mode dynamic desirable

B. switchport mode access

C. no switchport

D. switchport nonegotiate

Correct Answer: A

DESIRABLE must be paired with AUTO on other side to form.


Question 6:

Which free application make REST call against DNA center?

A. Postman

B. Ansible

C. Chef

D. Puppet

Correct Answer: A


Question 7:

Refer to the exhibit. Which JSON syntax is derived from this data?

A. {[{\’First Name\’: \’Johnny\’, \’Last Name\’: \’Table\’, \’Hobbies\’: [\’Running\’, \’Video games\’]}, {\’First Name\’: \’Billy\’, \’Last Name\’: \’Smith\’, \’Hobbies\’: [\’Napping\’, \’Reading\’]}]}

B. {\’Person\’: [{\’First Name\’: \’Johnny\’, \’Last Name\’: \’Table\’, \’Hobbies\’: \’Running\’, \’Video games\’}, {\’First Name\’: \’Billy\’, \’Last Name\’: \’Smith\’, \’Hobbies\’: \’Napping\’, \’Reading\’}]}

C. {[{\’First Name\’: \’Johnny\’, \’Last Name\’: \’Table\’, \’Hobbies\’: \’Running\’, \’Hobbies\’: \’Video games\’}, {\’First Name\’: \’Billy\’, \’Last Name\’: \’Smith\’, \’Hobbies\’: \’Napping\’, \’Reading\’}]}

D. {\’Person\’: [{\’First Name\’: \’Johnny\’, \’Last Name\’: \’Table\’, \’Hobbies\’: [\’Running\’, \’Video games\’]}, {\’First Name\’: \’Billy\’, \’Last Name\’: \’Smith\’, \’Hobbies\’: [\’Napping\’, \’Reading\’]}]}

Correct Answer: D

{

`Person\’:

[

{

`First Name\’: `Johnny\’,

`Last Name\’: `Table\’,

`Hobbies\’: [`Running\’, `Video games\’]

},

{

`First Name\’: `Billy\’,

`Last Name\’: `Smith\’,

`Hobbies\’: [`Napping\’, `Reading\’]

}

]

}


Question 8:

What does the Cisco WLC Layer 3 roaming feature allow clients to do?

A. maintain their IP address when roaming to an AP or controller with a different client VLAN assignment

B. maintain their connection between APs even when the AP management VLANs are different

C. maintain their connection even if the client IP address changes when roaming

D. roam seamlessly between controllers even when the controller management VLANs are different

Correct Answer: A

When a client initiates an L3 intercontroller roam, the two controllers involved can compare the VLAN numbers that are assigned to their respective WLAN interfaces If the two VLAN IDs differ, the controllers arrange a Layer 3 roam (also known as a local-to-foreign roam) that will allow the client to keep using its IP address.


Question 9:

Using the EIRP formula, what parameter is subtracted to determine the EIRP value?

A. transmitter power

B. antenna cable loss

C. antenna gain

D. signal-to-noise ratio

Correct Answer: B

Once you know the complete combination of transmitter power level, the length of cable, and the antenna gain, you can figure out the actual power level that will be radiated from the antenna. This is known as the effective isotropic radiated power (EIRP), measured in dBm. EIRP is a very important parameter because it is regulated by governmental agencies in most countries. In those cases, a system cannot radiate signals higher than a maximum allowable EIRP. To find the EIRP of a system, simply add the transmitter power level to the antenna gain and subtract the cable loss.


Question 10:

What is a characteristic of MACsec?

A. 802.1AE provides encryption and authentication services

B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802 1X session

C. 802.1AE is bult between the host and switch using the MKA protocol using keys generated via the Diffie-Hellman algorithm (anonymous encryption mode)

D. 802.1AE is negotiated using Cisco AnyConnect NAM and the SAP protocol

Correct Answer: B

MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out-of-band methods for encryption keying. The MACsec Key Agreement (MKA) Protocol provides the required session keys and manages the required encryption keys. MKA and MACsec are implemented after successful authentication using the 802.1x Extensible Authentication Protocol (EAP-TLS) or Pre Shared Key (PSK) framework.

Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst9300/software/release/16-9/configuration_guide/sec/b_169_sec_9300_cg/macsec_encryption.html


Question 11:

Reter to the exhibit.

An administrator troubleshoots intermittent connectivity from internal hosts to an external public server. Some internal hosts can connect to the server while others receive an ICMP Host Unreachable message and these hosts change over time. What is the cause of this issue?

A. The translator does not use address overloading

B. The NAT ACL does not match alt internal hosts

C. The NAT ACL and NAT pool share the same name

D. The NAT pool netmask rs excessively wide

Correct Answer: A


Question 12:

Refer to the exhibit.

These commands have been added to the configuration of a switch. Which command flags an error if it is added to this configuration?

A. monitor session 1 source interface port-channel 6

B. monitor session 1 source vlan 10

C. monitor session 1 source interface FastEthernet0/1 rx

D. monitor session 1 source interface port-channel 7, port-channel 8

Correct Answer: B

RSPAN consists of at least one RSPAN source session, an RSPAN VLAN, and at least one RSPAN destination session. You separately configure RSPAN source sessions and RSPAN destination sessions on different network devices. To configure an RSPAN source session on a device, you associate a set of source ports or source VLANs with an RSPAN VLAN.

Traffic monitoring in a SPAN session has these restrictions: + Sources can be ports or VLANs, but you cannot mix source ports and source VLANs in the same session.

Reference:

https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3750x_3560x/software/release/12-2_55_se/configuration/guide/3750xscg/swspan.html

Therefore in this question, we cannot configure a source VLAN because we configured source ports for RSPAN session 1 already.


Question 13:

In OSPF, which LAS type is responsible for pointing to the ASBR router?

A. type 1

B. type 2

C. type 3

D. type 4

Correct Answer: D


Question 14:

DRAG DROP

An engineer plans to use Python to convert text files that contain device information to JSON Drag and drop the code snippets from the bottom onto the blanks in the code to construct the request. Not all options are used.

Select and Place:

Correct Answer:


Question 15:

How are the different versions of IGMP compatible?

A. IGMPv2 is compatible only with IGMPv1.

B. IGMPv2 is compatible only with IGMPv2.

C. IGMPv3 is compatible only with IGMPv3.

D. IGMPv3 is compatible only with IGMPv1

Correct Answer: A