Cisco 350-401 v2024-10-22 q429
Cisco 350-401 v2024-10-22 q429
q429
NEW QUESTION: 1
What is one primary REST security design principle?
A. fail-safe defaults
B. password hash
C. adding a timestamp in requests
D. OAuth
Answer: A (LEAVE A REPLY)
Reference: https://yurisubach.com/2017/04/04/restful-api-security-principles/"Fail-safe defaultsAccess to any
resource (like API endpoint) should be denied by default. Access granted only in case of specific permission.
NEW QUESTION: 2
Refer to the exhibit.
NEW QUESTION: 4
Why would a small or mid-size business choose a cloud solution over an on-premises solution?
A. Cloud provides higher data security than on-premises.
B. Cloud provides more control over the implementation process than on-premises.
C. Cloud provides greater ability for customization than on-premises.
D. Cloud provides lower upfront cost than on-premises.
Answer: (SHOW ANSWER)
Small or mid-size businesses often opt for cloud solutions due to the lower upfront costs compared to on-
premises solutions. Cloud services typically offer a subscription model allowing businesses to scale resources
according to their needs, avoiding large capital expenditures required for on-premises infrastructure.
NEW QUESTION: 5
Refer to the exhibit.
An engineer attempts to establish BGP peering between router CORP and two ISP routers. What is the root
cause for the failure between CORP and ISP#2?
A. Router ISP#2 is configured to use SHA-1 authentication.
B. There is a password mismatch between router CORP and router ISP#2.
C. Router CORP is configured with an extended access control list.
D. MD5 authorization is configured incorrectly on router ISP#2.
Answer: (SHOW ANSWER)
The failure of BGP peering between router CORP and ISP#2 is due to a password mismatch. BGP peering
requires both routers to have matching passwords if password authentication is configured. If the passwords do
not match, the BGP session will not be established, and the routers will not exchange routes.
NEW QUESTION: 6
In a Cisco SD-Access solution, what is the role of the Identity Services Engine?
A. It is leveraged for dynamic endpoint to group mapping and policy definition.
B. It provides GUI management and abstraction via apps that share context.
C. it is used to analyze endpoint to app flows and monitor fabric status.
D. It manages the LISP EID database.
Answer: (SHOW ANSWER)
The Identity Services Engine (ISE) in a Cisco SD-Access solution plays a crucial role in security and access
control. It acts as a centralized policy management platform that enables the creation and enforcement of
access policies for endpoint devices. ISE uses information such as user identity, device type, and other context
to dynamically map endpoints to specific groups, thus defining the access levels and permissions for each
device within the network. This ensures that only authorized users and devices can access certain network
resources, enhancing the overall security posture.
References := Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
NEW QUESTION: 7
Which device, in a LISP routing architecture, receives and de-encapsulates LISP traffic for endpoints within a
LISP-capable site?
A. MR
B. ETR
C. OMS
D. ITR
Answer: (SHOW ANSWER)
In a Locator/ID Separation Protocol (LISP) routing architecture, the Egress Tunnel Router (ETR) is responsible
for receiving and de-encapsulating LISP traffic for endpoints within a LISP-capable site. The ETR registers its
EID prefixes and RLOCs with the Map-Server and responds to map requests received from the Map-Server. On
the data plane side, an ETR receives packets from core-facing interfaces, de-encapsulates them, and delivers
them to local EIDs at the site.
NEW QUESTION: 8
A network engineer configures BGP between R1 and R2. Both routers use BGP peer group CORP and are set
up to use MD5 authentication. This message is logged to the console of router R1:
Which two configuration allow peering session to from between R1 and R2? Choose two.)
A. R1(config-router)#neighbor 10.10.10.1 peer-group CORP R1(config-router)#neighbor CORP password
Cisco
B. R2(config-router)#neighbor 10.120.10.1 peer-group CORP R2(config-router)#neighbor CORP password
Cisco
C. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor PEER password Cisco
D. R1(config-router)#neighbor 10.120.10.1 peer-group CORP R1(config-router)#neighbor CORP password
Cisco
E. R2(config-router)#neighbor 10.10.10.1 peer-group CORP R2(config-router)#neighbor CORP password Cisco
Answer: (SHOW ANSWER)
The error message indicates an MD5 authentication failure between the two BGP peers. The IP addresses
involved are 10.10.10.1 and 10.120.10.1, which should correspond to R1 and R2 respectively. The correct
configurations to resolve this issue would be to ensure that both routers are configured with the same password
for MD5 authentication within the same peer group CORP.
Option A is correct because it configures R1 with the CORP peer group and sets the password to "Cisco" for
MD5 authentication.
Option E is correct because it configures R2 with a neighbor in the CORP peer group at IP address 10.10.10.1
(which should be R1) and sets the password to "Cisco" for MD5 authentication.
References := Implementing and Operating Cisco Service Provider Network Core Technologies
NEW QUESTION: 9
Which two Cisco SD-WAN components exchange OMP information?
A. vAnaiytlcs
B. vSmart
C. WAN Edge
D. vBond
E. vManage
Answer: (SHOW ANSWER)
In the Cisco SD-WAN architecture, the Overlay Management Protocol (OMP) is used to exchange routing,
policy, and management information between the vSmart controllers and the WAN Edge routers. The vSmart
controller acts as a central orchestrator that communicates with each WAN Edge router to distribute policies
and maintain a cohesive network state. References: Implementing and Operating Cisco Service Provider
Network Core Technologies (SPCOR) - Official Certification Guide
NEW QUESTION: 10
NEW QUESTION: 11
An engineer must configure a new WLAN that allows a user to enter a passphrase and provides forward
secrecy as a security measure. Which Layer 2 WLAN configuration is required on the Cisco WLC?
A. WPA2 Personal
B. WPA3 Enterprise
C. WPA3 Personal
D. WPA2 Enterprise
Answer: (SHOW ANSWER)
WPA3 Personal is the correct configuration for a WLAN that requires a passphrase for user access and
provides forward secrecy, which ensures that session keys cannot be compromised even if the long-term secret
keys are compromised. WPA3 enhances security over WPA2 by using the Simultaneous Authentication of
Equals (SAE) protocol, which replaces the Pre-Shared Key (PSK) exchange mechanism. References:
Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training
NEW QUESTION: 12
What is the function of vBond in a Cisco SD-WAN deployment?
A. initiating connections with SD-WAN routers automatically
B. pushing of configuration toward SD-WAN routers
C. onboarding of SD-WAN routers into the SD-WAN overlay
D. gathering telemetry data from SD-WAN routers
Answer: (SHOW ANSWER)
The function of vBond in a Cisco SD-WAN deployment is to onboard SD-WAN routers into the SD-WAN
overlay. vBond orchestrates the establishment of control connections between the controllers and the SD-WAN
routers, ensuring initial authentication and facilitating the joining process of the routers to the SD-WAN fabric.
NEW QUESTION: 13
Refer to the exhibit. An engineer has configured Cisco ISE to assign VLANs to clients based on their method of
authentication, but this is not working as expected. Which action will resolve this issue?
A. require a DHCP address assignment
B. utilize RADIUS profiling
C. set a NAC state
D. enable AAA override
Answer: (SHOW ANSWER)
In Cisco Identity Services Engine (ISE), when you want to assign VLANs to clients based on their method of
authentication, you must enable the AAA Override option in the authorization profile settings. This allows
attributes such as VLAN ID, Access Control Lists (ACLs), and session timeout values received in RADIUS
accept messages from Cisco ISE to override the interface configuration on the network access device. Without
enabling AAA Override, the network device will not apply the VLAN assignments specified by ISE during
authentication.
NEW QUESTION: 14
Which unit of measure is used to measure wireless RF SNR?
A. mW
B. bBm
C. dB
D. dBi
Answer: (SHOW ANSWER)
Wireless RF SNR (Signal to Noise Ratio) is measured in decibels (dB). It quantifies the clarity of the signal
received by comparing the level of the desired signal to the level of background noise. A higher SNR indicates
that the signal is clearer and less affected by noise. References := Implementing and Operating Cisco Service
Provider Network Core Technologies
NEW QUESTION: 15
What is one method for achieving REST API security?
A. using built-in protocols known as Web Services Security
B. using a combination of XML encryption and XML signatures
C. using a MD5 hash to verify the integrity
D. using HTTPS and TLS encryption
Answer: (SHOW ANSWER)
REST API security is best achieved through the use of HTTPS and TLS encryption, which ensures that data
transmitted between the client and server is encrypted and secure from interception or tampering.
References := Implementing and Operating Cisco Service Provider Network Core Technologies
NEW QUESTION: 16
Which action is the vSmart controller responsible for in a Cisco SO-WAN deployment?
A. manage, maintain, and gather configuration and status for nodes within me SD-WAN fabric
B. gather telemetry data from WAN Edge routes
C. distribute security information for tunnel establishment between WAN Edge routers
D. onboard WAN Edge nodes into the SD-WAN fabric
Answer: (SHOW ANSWER)
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 17
A network engineer configures a WLAN controller with increased security for web access. There is IP
connectivity with the WLAN controller, but the engineer cannot start a management session from a web
browser. Which action resolves the issued
A. Disable JavaScript on the web browser
B. Disable Adobe Flash Player
C. Use a browser that supports 128-bit or larger ciphers.
D. Use a private or incognito session.
Answer: (SHOW ANSWER)
When a network engineer is unable to start a management session from a web browser despite having IP
connectivity with the WLAN controller, it indicates a security protocol issue. Modern web access security often
requires browsers to support strong encryption ciphers. In this case, using a browser that supports 128-bit or
larger ciphers ensures that the browser can handle the secure web access protocols implemented by the
WLAN controller.
NEW QUESTION: 18
Which tunnel type al'ows clients to perform a seamless Layer 3 roam between a Cisco AireOS WLC and a
Cisco IOS XE WLC?
A. Ethernet over IP
B. IPsec
C. Mobility
D. VPN
Answer: (SHOW ANSWER)
The Mobility tunnel type allows for seamless Layer 3 roaming between different wireless LAN controllers, such
as Cisco AireOS WLC and Cisco IOS XE WLC. This tunnel type enables clients to maintain their IP address
and session continuity while moving across different access points managed by these controllers.
References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training
materials
NEW QUESTION: 19
Why does the vBond orchestrator have a public IP?
to enable vBond to team the public IP of WAN Edge devices that are behind NAT gateways or in private
address space
A. to facilitate downloading and distribution of operational and security patches
B. to allow for global reachability from all WAN Edges in the Cisco SD-WAN and
C. to facilitate NAT traversal to provide access
D. to Cisco Smart Licensing servers for license enablement
Answer: C (LEAVE A REPLY)
The vBond orchestrator in Cisco SD-WAN architecture is assigned a public IP address to facilitate NAT
traversal. This is crucial for establishing secure connections with WAN Edge devices that are located behind
NAT gateways or within private address spaces, ensuring that all devices can communicate effectively within
the SD-WAN network1.
References := Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) v1.0
training material1
NEW QUESTION: 20
NEW QUESTION: 21
Which there application has the ability to make REST calls against Cisco DNA Center?
A. API Explorer
B. REST Explorer
C. Postman
D. Mozilla
Answer: (SHOW ANSWER)
Postman is an application that has the ability to make REST calls against Cisco DNA Center. It is a popular tool
used by developers and network engineers to test and develop APIs. Postman allows users to send HTTP
requests to RESTful APIs and view the responses, making it an ideal tool for interacting with Cisco DNA
Center's REST APIs. References := Introduction to Cisco DNA Center REST APIs
NEW QUESTION: 22
Refer to the exhibit.
The administrator troubleshoots an EtherChannel that keeps moving to err-disabled. Which two actions must be
taken to resolve the issue? (Choose two.)
A. Reload the switch to force EtherChannel renegotiation
B. Ensure that interfaces Gi1/0/2 and Gi1/0/3 connect to the same neighboring switch.
C. Ensure that the switchport parameters of Port channel1 match the parameters of the port channel on the
neighbor switch
D. Ensure that the corresponding port channel interface on the neighbor switch is named Port-channel1.
E. Ensure that the neighbor interfaces of Gi1/0/2 and Gi/0/3 are configured as members of the same
EtherChannel
Answer: (SHOW ANSWER)
Causes of Errdisable
This feature was first implemented in order to handle special collision situations in which the switch detected
excessive or late collisions on a port. Excessive collisions occur when a frame is dropped because the switch
encounters 16 collisions in a row. Late collisions occur after every device on the wire should have recognized
that the wire was in use. Possible causes of these types of errors include:
* A cable that is out of specification (either too long, the wrong type, or defective)
* A bad network interface card (NIC) card (with physical problems or driver problems)
* A port duplex misconfiguration
A port duplex misconfiguration is a common cause of the errors because of failures to negotiate the speed and
duplex properly between two directly connected devices (for example, a NIC that connects to a switch). Only
half-duplex connections should ever have collisions in a LAN. Because of the carrier sense multiple access
(CSMA) nature of Ethernet, collisions are normal for half duplex, as long as the collisions do not exceed a small
percentage of traffic.
NEW QUESTION: 23
What are two differences between the RIB and the FIB? (Choose two.)
A. The FIB is derived from the data plane, and the RIB is derived from the FIB.
B. The RIB is a database of routing prefixes, and the FIB is the Information used to choose the egress interface
for each packet.
C. FIB is a database of routing prefixes, and the RIB is the information used to choose the egress interface for
each packet.
D. The FIB is derived from the control plane, and the RIB is derived from the FIB.
E. The RIB is derived from the control plane, and the FIB is derived from the RIB.
Answer: (SHOW ANSWER)
The RIB (Routing Information Base) is a database of routing prefixes that includes all learned routes, such as
those from dynamic routing protocols, static routes, and directly connected routes. The FIB (Forwarding
Information Base), on the other hand, is used to make IP destination prefix-based switching decisions and
contains only the best path as determined by the routing protocol, which is used to forward packets12345.
References := Cisco documentation and learning resources on RIB and FIB.
NEW QUESTION: 24
Refer to the exhibit.
An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as an entry point. Assuming that all
BGP neighbor relationships have been formed and that the attributes have not been changed on any of the
routers, which configuration accomplish task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
To ensure that all traffic leaving AS 200 chooses Link 2 as the entry point, the engineer can manipulate the
BGP attributes to make path via Link 2 more preferable. In this case, prepending AS numbers to the route
advertisement will make the path appear longer and thus less preferable through Link 1. By applying route-map
PREPEND with additional AS numbers on R3 for neighbor 10.1.1.1 (Link 1) and not doing so for neighbor
10.2.2.2 (Link 2), it will cause traffic to prefer entering through Link 2 which appears to have a shorter AS path.
References: = This explanation is based on common BGP practices covered in Cisco's Implementing and
Operating Cisco Service Provider Network Core Technologies (SPCOR) curriculum, where manipulating BGP
attributes such as AS_PATH is discussed as a method for influencing routing decisions.
NEW QUESTION: 25
An engineer must configure the strongest password authentication to locally authenticate on a router. Which
configuration must be used?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
The strongest password authentication for local router access would be one that uses a strong encryption
algorithm to hash the password. In Cisco routers, this can be achieved by using the "username [username]
secret" command followed by a complex password string which is then encrypted using a strong hashing
algorithm like SHA-256 or MD5. References: Implementing and Operating Cisco Service Provider Network
Core Technologies (SPCOR) v1.1 Reference: https://community.cisco.com/t5/networking-
documents/understanding-the-differences-between-the-c
NEW QUESTION: 26
What is a client who is running 802.1x for authentication reffered to as?
A. supplicant
B. NAC device
C. authenticator
D. policy enforcement point
Answer: (SHOW ANSWER)
In the context of 802.1x authentication, the client device attempting to gain access to the network is referred to
as the supplicant. The supplicant is responsible for providing the necessary credentials to the authenticator,
which is typically a network access device like a switch or wireless access point, to validate its identity and
grant network access. References: The SPCOR course objectives include understanding the roles of different
entities in 802.1x authentication, including the supplicant, authenticator, and authentication server3
NEW QUESTION: 27
Drag and drop the Cisco SD-Access solution areas from the left onto the protocols they use on the right.
Answer:
Explanation:
NEW QUESTION: 28
Refer to the exhibit.
An engineer must modify the access control list EGRESS to allow all IP traffic from subnet 10.1.10.0/24 to
10.1.2.0/24. The access control list is applied in the outbound direction on router interface GigabitEthemet 0/1.
Which configuration commands can the engineer use to allow this traffic without disrupting existing traffic flows?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The configuration commands in option C correctly specify the source subnet as 10.1.10.0 with the wildcard
mask 0.0.0.255 and the destination subnet as 10.1.2.0 with the wildcard mask 0.0.0.255. This allows all IP
traffic from the source subnet to the destination subnet as required. The commands are entered in the global
configuration mode, modifying the existing EGRESS access control list without disrupting other traffic flows.
References: The information is based on the Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) course
NEW QUESTION: 29
Refer to the exhibit. Which two configurations enable R1 and R2 to advertise routes into OSPF? (Choose two)
A.
B.
C.
D.
E.
Answer: (SHOW ANSWER)
To enable R1 and R2 to advertise routes into OSPF, the configurations must include the network command
under OSPF configuration mode specifying the network to be advertised along with the appropriate wildcard
mask and area ID. Additionally, the interfaces that connect R1 and R2 should be configured with the ip ospf
command to include them in the OSPF process. References := The Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR) course covers OSPF configuration and optimization in a
Service Provider network infrastructure, which includes the use of the network and ip ospf commands for route
advertisement
NEW QUESTION: 30
NEW QUESTION: 31
Why is an AP joining a different WLC than the one specified through option 43?
A. The WLC is running a different software version.
B. The API is joining a primed WLC
C. The AP multicast traffic unable to reach the WLC through Layer 3.
D. The APs broadcast traffic is unable to reach the WLC through Layer 2.
Answer: (SHOW ANSWER)
An AP may join a different WLC than the one specified through option 43 if it has been primed to join another
WLC. Priming is the process of pre-configuring an AP with specific WLC details, such as the IP address, so that
when the AP boots up, it knows which controller to join. If an AP is primed to a specific WLC, it will ignore
DHCP option 43 and attempt to join the primed WLC. References: Cisco Community, Cisco Community, Cisco
Documentation
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 32
Simulation 04
Answer:
See the Solution below.
Explanation:
R1
Router ospf 1
Int loop0
Ip ospf 1 area 0
Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point
Copy run start
R2
Router ospf 1
Int loop0
Ip ospf 1 area 0
Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point
Copy run start
Verification:-
NEW QUESTION: 33
Refer to the exhibit.
An engineer must allow all users in the 10.2.2.0/24 subnet to access the Internet. To conserve address space
the public Interface address of 209 165 201.1 must be used for all external communication. Which command
set accomplishes these requirements?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The task requires configuring NAT (Network Address Translation) to allow all users in the subnet 10.2.2.0/24 to
access the Internet using a single public IP address, which is 209.165.201.1, for all external communication.
This is typically done using PAT (Port Address Translation), also known as NAT overload, which allows multiple
private IP addresses to be mapped to a single public IP address but with different port numbers.
The correct command set would include defining an access list that specifies the local subnet, configuring the
router's inside interface that connects to the local network with ip nat inside, configuring the outside interface
with ip nat outside, and then specifying the NAT rule that uses PAT by referring to the access list and indicating
overload.
Option C is likely correct because it includes these elements:
* An access control list (ACL) that permits traffic from the 10.2.2.0/24 subnet.
* The ip nat inside command applied to an internal interface.
* The ip nat outside command applied to an external interface.
* A NAT rule that matches traffic permitted by the ACL and translates it using the IP address of the external
interface with overload enabled.
NEW QUESTION: 34
Refer to the exhibit.
Which IP address becomes the active next hop for 192.168.102 0/24 when 192.168.101.2 fails?
A. 192.168.101.18
B. 192.168.101.6
C. 192.168.101.10
D. 192.168.101.14
Answer: (SHOW ANSWER)
The active next hop IP address for the subnet 192.168.102.0/24 when the primary IP address 192.168.101.2
fails would be 192.168.101.6. This is based on the IP routing protocols and redundancy mechanisms such as
HSRP, VRRP, or GLBP, which are designed to provide high availability by allowing multiple routers to work
together to present the appearance of a single virtual router to the hosts on the LAN. The specific active next
hop would depend on the priority and tracking configuration of these protocols on the routers in question.
References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training
material provides a comprehensive guide on configuring, verifying, troubleshooting, and optimizing next-
generation, Service Provider IP network infrastructures, including details on high-availability mechanisms and
IP routing protocols1
NEW QUESTION: 35
Which two methods are used to assign security group tags to the user in a Cisco Trust Sec architecture?
(Choose two )
A. modular QoS
B. policy routing
C. web authentication
D. DHCP
E. IEEE 802.1x
Answer: (SHOW ANSWER)
In Cisco TrustSec architecture, security group tags (SGTs) are assigned to users to enforce security policies.
DHCP and IEEE 802.1x are two methods used for this purpose. DHCP can be used to assign SGTs based on
the IP address assigned to a user, while IEEE 802.1x leverages user authentication to dynamically assign
SGTs. Modular QoS and policy routing are not directly involved in the assignment of SGTs; they are used for
other purposes such as traffic management and route selection based on policies.
References:
* Understanding Cisco TrustSec4
* Cisco TrustSec Configuration Guide5
NEW QUESTION: 36
Drag and drop the descriptions from the left onto the routing protocol they describe on the right.
Answer:
Explanation:
NEW QUESTION: 37
Which two actions are recommended as security best practices to protect REST API? (Choose two.)
A. Use a password hash
B. Enable out-of-band authentication
C. Use TACACS+ authentication
D. Use SSL for encryption
E. Enable dual authentication of the session
Answer: (SHOW ANSWER)
NEW QUESTION: 38
Refer to the exhibit.
An engineer attempts to bundle interface Gi0/0 into the port channel, but it does not function as expected.
Which action resolves the issue?
A. Configure channel-group 1 mode active on interface Gi0/0.
B. Configure no shutdown on interface Gi0/0
C. Enable fast LACP PDUs on interface Gi0/0.
D. Set LACP max-bundle to 2 on interface Port-channeM
Answer: (SHOW ANSWER)
In the context of Cisco devices, when configuring a port channel with LACP (Link Aggregation Control
Protocol), both ends of the port-channel must be set to compatible modes for the LACP bundle to form
successfully. The exhibit shows that interface Gi0/1 is in an active state (SA flag), which means it is actively
sending LACP packets. For Gi0/0 to join the bundle, it also needs to be set to either active or passive mode.
Since we want it to function as expected and form a port-channel, setting it to 'active' will ensure that it sends
LACP packets and attempts to negotiate with other LACP-enabled ports.
NEW QUESTION: 39
Drag and drop the descriptions of the VSS technology from the left to the right. Not all options are used.
Answer:
Explanation:
Graphical user interface Description automatically generated
NEW QUESTION: 40
A. LISP
B. CTS
C. SGT
D. VRF
Answer: A (LEAVE A REPLY)
The Cisco SD-Access control plane is based on the Locator/ID Separation Protocol (LISP). LISP allows for the
separation of the identity and location of network endpoints, which simplifies the management of devices and
users within the network.
NEW QUESTION: 41
What is a VPN in a Cisco SD-WAN deployment?
A. common exchange point between two different services
B. attribute to identify a set of services offered in specific places in the SD-WAN fabric
C. virtualized environment that provides traffic isolation and segmentation in the SD-WAN fabric
D. virtual channel used to carry control plane information
Answer: (SHOW ANSWER)
A VPN in a Cisco SD-WAN deployment refers to a virtualized environment that provides traffic isolation and
segmentation within the SD-WAN fabric. This allows for the creation of secure, encrypted tunnels across the
network, ensuring that data traffic is kept separate and secure from other network traffic. References
:= Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
NEW QUESTION: 42
What is one main REST security design principle?
A. separation of privilege
B. password hashing
C. confidential algorithms
D. OAuth
Answer: (SHOW ANSWER)
The REST security design principle of separation of privilege requires that granting permissions to an entity
should not be based solely on a single condition. Instead, a combination of conditions based on the type of
resource is a better approach. This principle helps in mitigating the risk of unauthorized access by ensuring that
permissions are granular and context-dependent. References: REST Security Design Principles - Medium1.
Separation of Privilege: Granting permissions to an entity should not be purely based on a single condition, a
combination of conditions based on the type of resource is a better idea.
https://restfulapi.net/security-essentials/#:~:text=REST%20Security%20Design%20Principles&text=Least%20P
NEW QUESTION: 43
Which two GRE features are configured to prevent fragmentation? (Choose two.)
A. TCP MSS
B. PMTUD
C. DF bit Clear
D. MTU ignore
E. IP MTU
F. TCP window size
Answer: A,B (LEAVE A REPLY)
To prevent fragmentation in GRE tunnels, two features are configured: TCP MSS (Maximum Segment Size)
and PMTUD (Path Maximum Transmission Unit Discovery). TCP MSS adjusts the maximum segment size of
TCP packets to ensure they don't exceed the MTU, avoiding fragmentation. PMTUD discovers the path MTU
between two IP hosts, so that IP packets can be fragmented at the source to avoid fragmentation within the
network. References := Resolve IPv4 Fragmentation, MTU, MSS, and PMTUD Issues with GRE and IPsec -
Cisco, GRE Tunnel MTU, Interface MTU, and Fragmentation - Cisco Community
NEW QUESTION: 44
Which RF value represents the decline of the RF signal amplitude over a given distance?
A. signal-to-noise ration
B. effective isotropic racketed power
C. free space path loss
D. received signal strength indicator
Answer: (SHOW ANSWER)
The RF value representing the decline of the RF signal amplitude over a given distance is known as free space
path loss (FSPL). FSPL quantifies the loss of signal strength that occurs when an electromagnetic wave travels
through a clear path (free space) without obstacles that could cause reflection or diffraction. It's a critical factor
in designing wireless networks to ensure adequate signal coverage and strength.
References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training
materials1
NEW QUESTION: 45
Drag and drop the snippets onto the blanks within the code to construct a script that configures BGP according
to the topology. Not all options are used, and some options may be used twice.
Answer:
Explanation:
Graphical user interface, text, application, email Description automatically generated
NEW QUESTION: 46
In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?
A. DHCP
B. VXLAN
C. SXP
D. LISP
Answer: (SHOW ANSWER)
In Cisco SD-Access fabric, LISP (Locator/ID Separation Protocol) is used for mapping and resolving endpoints.
LISP creates a separate Identity namespace (Endpoint IDs or EIDs) from the Routing Locator namespace
(RLOCs). This separation provides an improved mechanism for traffic routing among various endpoints within
the network. References := Implementing and Operating Cisco Service Provider Network Core Technologies
(SPCOR)
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 47
In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?
A. provide QoS prioritization services such as marking, queueing, and classification for critical network traffic
B. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster
convergence
C. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port security
D. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRP
Answer: (SHOW ANSWER)
In a three-tier hierarchical campus network design, the core layer should provide high-speed, reliable backbone
connectivity and fast convergence. Redundant Layer 3 point-to-point links between core devices ensure that
there is no single point of failure and that the network can quickly adapt to changes, maintaining service
availability and performance. References: Cisco's Design Best Practices for Enterprise Networks (as part of
Cisco's CCDA certification)
NEW QUESTION: 48
Reler to the exhibit. An engineer a configuring WebAuth on a Cisco Catalyst 9000 Series WIC. The engineer
has purchased a third-party certificate using the FQDN of the WLC as the CN and intends to use bit on the
WebAuth splash page What must be configured so that the clients do not receive a certificate error?
A. Virtual IPv4 Address must be set to a routatte address
B. Virtual IPv4 Hostname must match the CN of the certificate.
C. Trustpoint must be set to the management certificate of the WLC.
D. Web Au!h Interoepl HTTPs must be enabled.
Answer: (SHOW ANSWER)
When configuring WebAuth on a Cisco Catalyst 9000 Series WLC, it is crucial to ensure that clients do not
receive a certificate error when they are redirected to the WebAuth splash page. To achieve this, the Virtual
IPv4 Hostname must match the Common Name (CN) of the certificate used for the WebAuth page. This is
because the client's browser will check the CN on the certificate against the hostname it is connecting to. If
there is a mismatch, the browser will flag a certificate error, warning the user of a potential security risk. By
matching the Virtual IPv4 Hostname with the CN, the certificate validation process will pass, and clients will not
encounter a certificate error.
NEW QUESTION: 49
Refer to the exhibit.
An engineer must permit traffic from these networks and block all other traffic An informational log message
should be triggered when traffic enters from these prefixes Which access list must be used?
A. access-list acl_subnets permit ip 10.0.32.0 0 0.0.255 log
B. access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 log
C. access-list acl_subnets permit ip 10.0.32.0 0.0.7.255 access-list acl_subnets deny ip any log
D. access-list acl_subnets permit ip 10.0.32.0 255.255.248.0 log
Answer: (SHOW ANSWER)
The task is to create an access list that allows traffic from a specific range of networks while logging the traffic.
The networks in question span from 10.0.32.0/24 to 10.0.39.0/24. To summarize these networks into a single
entry, we use a subnet mask that encompasses all the individual /24 networks. The correct summary uses the
wildcard mask 0.0.7.255, which corresponds to the subnet mask 255.255.248.0. This wildcard mask allows for
all addresses from 10.0.32.0 to 10.0.39.255, which includes all the specified networks.
NEW QUESTION: 50
A. Not all of the controllers in the mobility group are using the same mobility group name.
B. Not all of the controllers within the mobility group are using the same virtual interface IP address.
C. All of the controllers within the mobility group are using the same virtual interface IP address.
D. All of the controllers in the mobility group are using the same mobility group name.
Answer: (SHOW ANSWER)
When wireless clients roam between different wireless controllers, they should experience seamless
connectivity if the controllers are correctly configured. A common configuration issue that can cause a network
connectivity outage during roaming is when the controllers in the mobility group do not have the same virtual
interface IP address. The virtual interface is used by the controllers to exchange mobility messages and
manage client state information. If the virtual interface IP addresses are not consistent across the mobility
group, the controllers cannot properly communicate, leading to potential outages during client roaming.
NEW QUESTION: 51
What do Cisco DNA southbound APIs provide?
A. Interface between the controller and the network devices
B. NETCONF API interface for orchestration communication
C. RESful API interface for orchestrator communication
D. Interface between the controller and the consumer
Answer: (SHOW ANSWER)
Cisco DNA southbound APIs are used to provide an interface between the controller (such as Cisco DNA
Center) and the network devices it manages. These APIs allow for communication from the controller down to
the devices to facilitate configuration, management, monitoring, and operations. References: Implementing and
Operating Cisco Service Provider Network Core Technologies (SPCOR) v1.0 - Southbound APIs in Cisco DNA
documentation.
The Southbound API is used to communicate with network devices.
Graphical user interface, text, application, chat or text message Description automatically generated
NEW QUESTION: 52
Which two methods are used to reduce the AP coverage area? (Choose two)
A. Reduce channel width from 40 MHz to 20 MHz
B. Disable 2.4 GHz and use only 5 GHz.
C. Reduce AP transmit power.
D. Increase minimum mandatory data rate
E. Enable Fastlane
Answer: (SHOW ANSWER)
Reducing the AP transmit power will decrease the range of the signal, thereby reducing the coverage area.
This is effective in controlling the spread of the wireless signal to only the desired areas. Increasing the
minimum mandatory data rate effectively shrinks the cell size because only clients capable of higher data rates
will be able to connect, which typically requires them to be closer to the AP.
NEW QUESTION: 53
By default, which virtual MAC address does HSRP group 32 use?
A. 00:5e:0c:07:ac:20
B. 04:18:20:83:2e:32
C. 05:5e:5c:ac:0c:32
D. 00:00:0c:07:ac:20
Answer: (SHOW ANSWER)
HSRP (Hot Standby Router Protocol) is a Cisco proprietary redundancy protocol for establishing a fault-tolerant
default gateway. The protocol establishes a framework between network routers in order to achieve default
gateway failover if the primary gateway becomes inaccessible, by assigning a virtual MAC address to the group
of routers participating in HSRP. By default, HSRP group 32 uses the virtual MAC address 00:00:0c:07:ac:20.
This address is composed of the Cisco OUI (Organizationally Unique Identifier)
00:00:0c, followed by the HSRP identifier 07:ac, and finally the HSRP group number in hexadecimal, which for
group 32 is 20. References: Cisco's official documentation on HSRP
NEW QUESTION: 54
Which JSON script is properly formatted?
A.
B.
C.
D.
Answer: A (LEAVE A REPLY)
JSON (JavaScript Object Notation) is a lightweight data-interchange format that is easy for humans to read and
write, and easy for machines to parse and generate. A properly formatted JSON script should have key-value
pairs with keys and string values enclosed in double quotation marks, and objects enclosed in curly braces {}.
Arrays should be enclosed in square brackets [], and each key-value pair should be separated by a comma,
except for the last pair in an object or array.
NEW QUESTION: 55
Reler to the exhibit The EtherChannel between SW1 and SW2 is not operational. Which a coon will resolve the
issue?
A. Configure channel-group 1 mode active on GVO and G1 1 of SW2.
B. Configure twitchport trunk encapsulation dot1q on SW1 and SW2.
C. Configure channel-group 1 mode active on Gl'O and GM of SW1 .
D. Configure switchport mode dynamic desirable on SW1 and SW2
Answer: (SHOW ANSWER)
The issue with the EtherChannel between SW1 and SW2 not being operational could be due to a
misconfiguration of the channel-group mode. Configuring both ends of the EtherChannel to be in active mode
ensures that LACP (Link Aggregation Control Protocol) is actively negotiating between both switches to
establish the EtherChannel link. References: Configuring EtherChannels
NEW QUESTION: 56
Which component transports data plane traffic across a Cisco SD-WAN network?
A. vSmart
B. vManage
C. cEdge
D. vBond
Answer: (SHOW ANSWER)
In a Cisco SD-WAN network, the data plane traffic is transported by the cEdge devices. These devices are
responsible for the forwarding of packets across the network, ensuring that data reaches its intended
destination. The cEdge operates at the network edge and is a critical component in the Cisco SD-WAN
architecture, handling the actual transmission of data packets.
NEW QUESTION: 57
Drag and drop the descriptions from the left onto the QoS components they describe on the right.
Answer:
Explanation:
Graphical user interface, text, application, email Description automatically generated
NEW QUESTION: 58
In a wireless network environment, what is calculated using the numerical values of the transmitter power level,
cable loss, and antenna gain?
A. RSSI
B. dBI
C. SNR
D. EIRP
Answer: (SHOW ANSWER)
EIRP (Effective Isotropic Radiated Power) is calculated using the numerical values of the transmitter power
level, cable loss, and antenna gain. It represents the power level that would be required if the antenna were an
ideal isotropic radiator, which radiates power equally in all directions. The EIRP is a critical factor in determining
the range and strength of the wireless signal.
NEW QUESTION: 59
In a Cisco SD-Access environment, which function is performed by the border node?
A. Connect uteri and devices to the fabric domain.
B. Group endpoints into IP pools.
C. Provide reachability information to fabric endpoints.
D. Provide connectivity to traditional layer 3 networks.
Answer: D (LEAVE A REPLY)
In a Cisco SD-Access environment, the border node is responsible for providing connectivity to traditional Layer
3 networks outside of the SD-Access fabric. It acts as an intermediary, facilitating communication between
endpoints within the fabric domain and external networks or services while maintaining the policy enforcement
and security features of SD-Access.
References: Implementing and Operating Cisco Service Provider Network Core Technologies source
documents or study guide.
NEW QUESTION: 60
Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must
be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?
A. permit host 172.16.0.2 host 192.168.0.5 eq 8080
B. permit host 192.168.0.5 host 172.16.0.2 eq 8080
C. permit host 192.168.0.5 eq 8080 host 172.16.0.2
D. permit host 192.168.0.5 it 8080 host 172.16.0.2
Answer: (SHOW ANSWER)
In Cisco routers, to allow traffic from a specific source to a specific destination on a particular port, the access
control list (ACL) needs to specify the source IP address, the destination IP address, and the destination port
number that needs to be accessed. Since PC-1 with IP address 172.16.0.2 is trying to access the web server
on port 8080 at IP address 192.168.0.5, the ACL applied inbound on SW2's G0/0 interface should permit traffic
from PC-1 to reach the web server's specific port. References: Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR) training materials.
NEW QUESTION: 61
Which type of antenna is designed to provide a 360-degree radiation pattern?
A. omnidirectional
B. Yagi
C. patch
D. directional
Answer: (SHOW ANSWER)
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 62
Refer to the exhibit.
An engineer must allow R1 to advertise the 192 168.1 0/24 network to R2 R1 must perform this action without
sending OSPF packets to SW1 Which command set should be applied?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
To advertise the 192.168.1.0/24 network to R2 without sending OSPF packets to SW1, the engineer must
configure OSPF in such a way that it includes the network in the OSPF advertisements to R2 but excludes it
from being advertised to SW1. This can typically be achieved by manipulating OSPF network types or using
OSPF passive-interface commands to prevent OSPF updates from being sent out through the interface
connected to SW1.
NEW QUESTION: 63
What is a characteristic of a traditional WAN?
A. low complexity and high overall solution scale
B. centralized reachability, security, and application policies
C. operates over DTLS and TLS authenticated and secured tunnels
D. united data plane and control plane
Answer: (SHOW ANSWER)
Traditional WANs are characterized by centralized reachability, security, and application policies. This means
that the WAN is managed from a central location, allowing for consistent policy enforcement and simplification
of the network structure. Traditional WANs do not operate over DTLS and TLS tunnels; instead, they rely on
dedicated leased lines, MPLS, or other types of connections that provide point-to-point connectivity. The data
plane and control plane are typically integrated in traditional WAN devices, such as routers, which handle both
forwarding data packets and the routing protocols that manage path selection.
References:
* Traditional WAN Design Summary - Cisco1
* The 2015 Guide to WAN Architecture & Design - Cisco2
* Traditional WAN vs. SD-WAN: Everything You Need to Know3
NEW QUESTION: 64
Drag and drop the characteristics from the left onto the deployment models on the right Not all options are
used.
Answer:
Explanation:
NEW QUESTION: 65
Refer to the exhibit.
Assuming the WLC's interfaces are not in the same subnet as the RADIUS server, which interface would the
WLC use as the source for all RADIUS-related traffic?
A. the interface specified on the WLAN configuration
B. any interface configured on the WLC
C. the controller management interface
D. the controller virtual interface
Answer: (SHOW ANSWER)
In a Cisco Wireless LAN Controller (WLC) setup, the controller management interface is used as the source for
all RADIUS-related traffic when the interfaces are not in the same subnet as the RADIUS server. This interface
is specifically designated for in-band management of the device, system traffic, and RADIUS-related
communication, ensuring secure and reliable authentication and authorization services. References
:= Implementing and Operating Cisco Service Provider Network Core Technologies
NEW QUESTION: 66
Refer to the exhibit. An engineer builds an EEM script to apply an access list. Which statement must be added
to complete the script?
A. event none
B. action 2.1 cli command "ip action 3.1 ell command 101''
C. action 6.0 ell command ''ip access-list extended 101''
D. action 6.0 cli command ''ip access-list extended 101"
Answer: (SHOW ANSWER)
The script is missing an event to trigger the EEM applet. In Cisco EEM (Embedded Event Manager), an event is
a specific occurrence on a network device that is detected by EEM. The "event none" statement is used in EEM
scripts when the applet is not triggered by any system events but can be manually run. In this case, since the
script aims to apply an access list, it doesn't need to be triggered automatically by any system events but can
be invoked as required.
References: Implementing and Operating Cisco Service Provider Network Core Technologies source
documents or study guide
NEW QUESTION: 67
What is a characteristic of YANG?
A. It is a Cisco proprietary language that models NETCONF data
B. It allows model developers to create custom data types
C. It structures data in an object-oriented fashion to promote model reuse
D. It provides loops and conditionals to control now within models
Answer: (SHOW ANSWER)
YANG (Yet Another Next Generation) is a data modeling language used to model configuration and state data
for network devices and services. It is not a Cisco proprietary language; rather, it is an open standard
developed by the IETF. YANG allows model developers to create custom data types, which is essential for
ensuring that models accurately represent the data they are intended to configure or monitor. This flexibility in
defining data types is one of the key characteristics that makes YANG a powerful tool for network modeling.
YANG models are structured in a modular fashion, which promotes reuse of models across different
implementations and vendors. While YANG does structure data in an object-oriented way, the ability to create
custom data types is a distinct characteristic that sets it apart from other data modeling languages.
NEW QUESTION: 68
Refer to the exhibit.
What is output by this code?
A. 8 7 6 5
B. -4 -5 -6 -7
C. -1 -2-3-4
D. 4 5 6 7
Answer: (SHOW ANSWER)
The code snippet provided in the exhibit is a simple Python program that initializes a variable count with the
value of 8. It then enters a while loop that continues executing as long as count is greater than 4. Inside the
loop, it prints the current value of count and then decrements count by one each iteration. As a result, it will
print the numbers 8, 7, 6, and 5 before count becomes less than or equal to four and the loop terminates.
NEW QUESTION: 69
Which NGFW mode block flows crossing the firewall?
A. Passive
B. Tap
C. Inline tap
D. Inline
Answer: (SHOW ANSWER)
In inline mode, the Cisco Next-Generation Firewall (NGFW) actively blocks flows crossing the firewall. This
mode allows the NGFW to intercept and analyze traffic in real-time, applying security policies and rules to
permit or deny traffic, thus providing active network security enforcement.
References: Cisco Firepower Next-Generation Firewall (NGFW) Data Sheet1.
NEW QUESTION: 70
Refer to the exhibit. Which command set must be added to permit and log all traffic that comes from
172.20.10.1 in interface GigabitEthernet0/1 without impacting the functionality of the access list?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
Option B is the correct answer because it specifically permits and logs all traffic that comes from IP address
172.20.10.1 on interface GigabitEthernet0/1 without impacting the functionality of the access list. The command
set in Option B is:
Router(config)#access-list 100 seq 5 permit ip host 172.20.10.1 any log Router(config)#interface
GigabitEthernet0/1 Router(config-if)#access-group 100 in This command set adds a sequence to the access list
(seq 5) that allows traffic from IP address 172.20.10.1, logs this traffic, and applies this access list to incoming
traffic on interface GigabitEthernet0/1.
NEW QUESTION: 71
How does the RIB differ from the FIB?
A. The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular
network destinations.
B. The FIB includes many routes a single destination. The RIB is the best route to a single destination.
C. The RIB includes many routes to the same destination prefix. The FIB contains only the best route
D. The FIB maintains network topologies and routing tables. The RIB is a Iist of routes to particular network
destinations.
Answer: (SHOW ANSWER)
The Routing Information Base (RIB) is a data table stored in a router or a networked computer that lists the
routes to particular network destinations, and in some cases, metrics (distances) associated with those routes.
The RIB contains all the routes learned via static configuration or dynamic routing protocols, such as BGP,
OSPF, etc. On the other hand, the Forwarding Information Base (FIB) is used by the router to make forwarding
decisions and contains only the best route to each destination prefix, which has been selected by the routing
protocol algorithms from the RIB. The FIB is optimized for fast lookup to expedite the forwarding process23.
References:
* "RIB vs FIB differences?" from Network Engineering Stack Exchange2.
* "What is the difference between the RIB and FIB?" from Cisco Learning Network
NEW QUESTION: 72
Refer to the exhibit.
NEW QUESTION: 73
An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role
when it has the highest priority in the group. Which command set is required to complete this task?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
In VRRP (Virtual Router Redundancy Protocol), the router with the highest priority will become the master
router for the group, provided it is higher than any other router in the group. The default priority is 100, and it
can be set up to 255. The command vrrp <group-number> priority <priority-value> is used to set the priority of a
VRRP group on an interface. To ensure that a router with a higher priority takes over as soon as it comes
online, you should also use the preempt command which enables the VRRP router to become master if it has a
higher priority than the current master. References: Implementing and Operating Cisco Service Provider
Network Core Technologies (SPCOR) training materials.
NEW QUESTION: 74
Refer to the exhibit.
Which configuration enables fallback to local authentication and authorization when no TACACS+ server is
available?
A. Router(config)# aaa authentication login default local Router(config)# aaa authorization exec default local
B. Router(config)# aaa authentication login default group tacacs+ local Router(config)# aaa authorization exec
default group tacacs+ local
C. Router(config)# aaa fallback local
D. Router(config)# aaa authentication login FALLBACK local Router(config)# aaa authorization exec
FALLBACK local
Answer: (SHOW ANSWER)
The correct configuration for fallback to local authentication and authorization when no TACACS+ server is
available is to specify 'local' as the secondary method after 'group tacacs+'. This ensures that if the TACACS+
server cannot be reached, the router will use the local database for authentication and authorization.
NEW QUESTION: 75
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
A. latency
B. hop count
C. time zone
D. stratum
Answer: (SHOW ANSWER)
The measure used by an NTP server to indicate its closeness to the authoritative time source is called the
stratum level. NTP operates hierarchically with several server levels, known as strata. The lower the stratum
number, the closer the server is to an authoritative time source, which ensures efficient propagation of time
information throughout the network hierarchy.
References: The information provided here is based on the search results from authoritative sources discussing
NTP server configurations and best practices
NEW QUESTION: 76
Refer to the exhibit. Which set of commands is required to configure and verify the VRF for Site 1 Network A on
router R1?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: D (LEAVE A REPLY)
The process of configuring a VRF on a Cisco router generally includes the following steps:
* Enable IP routing if not already enabled.
* Create the VRF instance using the ip vrf command.
* Assign a unique RD to the VRF using the rd command within the VRF configuration mode.
* Associate the VRF with a specific interface using the ip vrf forwarding command in interface configuration
mode.
* Assign an IP address to the interface.
* Verify the configuration using the show ip vrf or show ip route vrf command.
References: For detailed instructions and examples, refer to the Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR) source book and study guide, which provide comprehensive
coverage of VRF configuration and verification on Cisco routers.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 77
Drag and drop the LIPS components on the left to the correct description on the right.
Answer:
Explanation:
NEW QUESTION: 78
How does the Cisco SD-Access control plane simplify traditional routing environments?
A. Routing adjacencies are no longer required.
B. Full routing tables are shared and ensure that all routers know all paths within the underlay fabric and
overlay.
C. Separation of EID and RLOC reduces the size of routing tables.
D. Routers query all routes to the map server.
Answer: (SHOW ANSWER)
Cisco SD-Access control plane simplifies traditional routing environments by using Locator/ID Separation
Protocol (LISP). LISP separates the endpoint identifiers (EIDs) from the routing locators (RLOCs), which
reduces the size of routing tables as routers only need to know the RLOCs for routing, not the EIDs1234.
References: Cisco SD-Access Solution Design Guide1.
NEW QUESTION: 79
Refer to the exhibit How was spanning-tree configured on this interface?
A. By entering the command spanning-tree portfast trunk in the interface configuration mode.
B. By entering the command spanning-tree portfast in the interface configuration mode
C. By entering the command spanning-tree mst1 vlan 10,20,30,40 in the global configuration mode
D. By entering the command spanning-tree vlan 10,20,30,40 root primary in the interface configuration mode
Answer: (SHOW ANSWER)
The exhibit shows the configuration of spanning-tree on an interface with all VLANs (VLAN0010, VLAN0020,
VLAN0030, VLAN0040) in a Designated Forwarding state and Type as Point-to-Point Edge.
This configuration is consistent with the enabling of PortFast on the interface. PortFast is enabled by entering
the command spanning-tree portfast in the interface configuration mode. PortFast causes a switch or trunk port
to enter the spanning tree forwarding state immediately, bypassing the listening and learning states.
References: Implementing and Operating Cisco Service Provider Network Core Technologies Study Guide
NEW QUESTION: 80
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The correct configuration to restrict the amount of SSH traffic that a router accepts to 100 kbps involves
creating a policy map that specifies the maximum bandwidth for the class of traffic. This is done by defining a
class map to match the SSH traffic, then creating a policy map that uses the police command to set the rate
limit. The policy map is then applied to the control plane to enforce the limit on SSH traffic.
References: The information is based on the Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) source book CoPP protects the route processor on network devices by treating route
processor resources as a separate entity with its own ingress interface (and in some implementations, egress
also). CoPP is used to police traffic that is destined to the route processor of the router such as:
+ routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.
Therefore we must apply the CoPP to deal with SSH because it is in the
management plane. CoPP must be put under "control-plane" command.
NEW QUESTION: 81
Refer to Ihe exhibit. An engineer must update the existing configuation to achieve these resu ts:
* Only administrators from the 192.168 1.0.'?4 subnet can access the vty lines.
* Access to the vty lines using clear-text protocols is prohibited.
Which command set should be appled?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The command set in Option C correctly applies an access list to permit only the specified subnet to access the
VTY lines. Additionally, it specifies the use of secure protocols by enabling transport input ssh, which prohibits
clear-text protocols like telnet.
NEW QUESTION: 82
What is the role of the RP in PIM sparse mode?
A. The RP responds to the PIM join messages with the source of requested multicast group
B. The RP maintains default aging timeouts for all multicast streams requested by the receivers.
C. The RP acts as a control-plane node and does not receive or forward multicast packets.
D. The RP is the multicast that is the root of the PIM-SM shared multicast distribution tree.
Answer: (SHOW ANSWER)
In Protocol Independent Multicast sparse mode (PIM-SM), the Rendezvous Point (RP) plays a crucial role in
the multicast distribution architecture. The RP acts as a central point in the network where multicast sources
send their traffic. This traffic is then distributed to the receivers down a shared distribution tree. The RP is
essentially the root of this shared tree and is vital for starting new sessions with sources and receivers. It is
important to note that the RP is required only in networks running PIM-SM, as it is designed to efficiently
manage multicast traffic by forwarding it only to network segments with active receivers that have explicitly
requested the data. This contrasts with PIM Dense Mode (PIM-DM), where multicast traffic is initially flooded to
all segments of the network, and unwanted traffic is pruned back12.
References:
* Cisco's "Configuring a Rendezvous Point" document provides an overview and configuration examples for
RPs in PIM-SM networks1.
* The "IP Multicast: PIM Configuration Guide - PIM Allow RP" document from Cisco details the configuration of
the PIM Allow RP feature in PIM-SM domains2
NEW QUESTION: 83
Simulation 07
Answer:
See the solution below.
Explanation:
Sw1
Config t
Archive
Log config
Logging enable
Notify syslog
R1
Config t
Ip flow-top-talkers
Match source address 172.16.2.1/30
Int et0/2
Ip flow ingress
Copy run start
NEW QUESTION: 84
If the maximum power level assignment for global TPC 802.11a/n/ac is configured to 10 dBm, which power
level effectively doubles the transmit power?
A. 13dBm
B. 14 dBm
C. 17dBm
D. 20 dBm
Answer: (SHOW ANSWER)
Suppose a transmitter is configured for a power level of 10 dBm. A cable with 5-dB loss connects the
transmitter to an antenna with an 8-dBi gain. The resulting EIRP of the system is EIRP = 10 dBm - 5 dB + 8 dBi
= 13 dBm.
NEW QUESTION: 85
Which of the following fiber connector types is the most likely to be used on a network interface card?
A. LC
B. SC
C. ST
D. MPO
Answer: (SHOW ANSWER)
The LC (Lucent Connector) is commonly used on network interface cards due to its compact size and secure
locking mechanism. It is well-suited for high-density connections, such as those found in data centers and
telecommunications environments.
NEW QUESTION: 86
Refer to the exhibit.
A company requires that all wireless users authenticate using dynamic key generation. Which configuration
must be applied?
A. AP(config-if-ssid)# authentication open wep wep_methods
B. AP(config-if-ssid)# authentication dynamic wep wep_methods
C. AP(config-if-ssid)# authentication dynamic open wep_dynamic
D. AP(config-if-ssid)# authentication open eap eap_methods
Answer: (SHOW ANSWER)
Dynamic key generation is a security feature used in wireless networks to provide each user with a unique
encryption key, which is dynamically generated and distributed by the authentication server. This method
enhances security by ensuring that even if one key is compromised, it does not affect the security of other
users' connections. The correct command to configure an access point (AP) to require wireless users to
authenticate using dynamic key generation is AP(config-if-ssid)# authentication dynamic open wep_dynamic.
This command sets the AP to use dynamic WEP (Wired Equivalent Privacy) keys along with open
authentication.
References: The information is based on the Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) training
NEW QUESTION: 87
A network administrator is designing a new network for a company that has frequent power spikes. The
company wants to ensure that employees can the best solution for the administrator to recommend?
A. Generator
B. Cold site
C. Redundant power supplies
D. Uninterruptible power supply
Answer: D (LEAVE A REPLY)
An uninterruptible power supply (UPS) is the best solution to ensure continuous power to the network
equipment during power spikes and outages. A UPS provides immediate backup power and allows for a safe
shutdown of equipment, preventing data loss and hardware damage.
NEW QUESTION: 88
Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?
A. Cisco Firepower and FireSIGHT
B. Cisco Stealth watch system
C. Advanced Malware Protection
D. Cisco Web Security Appliance
Answer: (SHOW ANSWER)
The Cisco Stealthwatch system is the component of the Cisco Cyber Threat Defense solution that provides
user and flow context analysis. This system offers broad visibility across the network and is designed to analyze
and understand network behaviors, detect anomalies, and provide insights into network traffic patterns. It
leverages NetFlow data to perform security monitoring, application visibility, and control, as well as incident
response. By analyzing the flow data, Stealthwatch can identify malicious activities and potential threats within
the network, enabling a more proactive defense posture.
References: The information is based on the Cisco Cyber Threat Defense v2.0 Design Guide
NEW QUESTION: 89
A network engineer wants to configure console access to a router without using AAA so that the privileged exec
mode is entered directly after a user provides the correct login credentials. Which action achieves this goal?
A. Configure login authentication privileged on line con 0.
B. Configure a local username with privilege level 15.
C. Configure privilege level 15 on line con 0.
D. Configure a RADIUS or TACACS+ server and use it to send the privilege level.
Answer: (SHOW ANSWER)
To configure console access to a router without using AAA and to ensure that the privileged exec mode is
entered directly after providing the correct login credentials, a local username with privilege level 15 should be
configured. This is because privilege levels define the commands that users can access on the router. By
setting a user to privilege level 15, they are granted full access to all the router's commands, including those in
privileged exec mode, without the need to enter the enable command.
NEW QUESTION: 90
NEW QUESTION: 91
Which activity requires access to Cisco DNA Center CLI?
A. provisioning a wireless LAN controller
B. creating a configuration template
C. upgrading the Cisco DNA Center software
D. graceful shutdown of Cisco DNA Center
Answer: C (LEAVE A REPLY)
Access to Cisco DNA Center CLI is required when upgrading the Cisco DNA Center software. The CLI provides
a direct interface to the underlying system, allowing for detailed control and monitoring of the upgrade process.
It is essential for executing commands that may not be available through the graphical user interface (GUI),
ensuring a precise and controlled software upgrade. References: The official Cisco documentation outlines the
procedure for upgrading Cisco DNA Center software via CLI, detailing the necessary steps and precautions to
take during the process
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 92
Drag and drop the characteristics from the left onto the technology types on the right.
Answer:
Explanation:
Orchestration
Orchestration means arranging or coordinating multiple systems. It's also used to mean "running the same
tasks on a bunch of servers at once, but not necessarily all of them." Configuration Management Config
Management is part of provisioning. Basically, that's using a tool like Chef, Puppet or Ansible to configure our
server. "Provisioning" often implies it's the first time we do it. Config management usually happens repeatedly.
Configuration management (CM) is a systems engineering process for establishing and maintaining
consistency of a product's performance, functional, and physical attributes with its requirements, design, and
operational information throughout its life Configuration management is all about bringing consistency in the
infrastructure.
Configuration Orchestration vs Configuration Management
The first thing that should be clarified is the difference between "configuration orchestration" and
"configuration management" tools, both of which are considered IaC tools and are included on this list.
Configuration orchestration tools, which include Terraform and AWS CloudFormation, are designed to
automate the deployment of servers and other infrastructure. Configuration management tools like Chef,
Puppet, and the others on this list help configure the software and systems on this infrastructure that has
already been provisioned.
NEW QUESTION: 93
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands
are needed to accomplish this task? (Choose two.)
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: (SHOW ANSWER)
To configure AAA for central web authentication on a Cisco 9800 WLC, you typically need to define the
RADIUS server and create an authorization method list. The RADIUS server holds the authentication and
authorization policies, while the method list specifies the sequence of methods to be used for authorization.
NEW QUESTION: 94
A network administrator is implementing a routing configuration change and enables routing debugs to track
routing behavior during the change. The logging output on the terminal is interrupting the command typing
process. Which two actions can the network administrator take to minimize the possibility of typing commands
incorrectly? (Choose two.)
A. Configure the logging synchronous global configuration command
B. Configure the logging delimiter feature
C. Configure the logging synchronous command under the vty
D. Press the TAB key to reprint the command in a new line
E. increase the number of lines on the screen using the terminal length command
Answer: (SHOW ANSWER)
To minimize the possibility of typing commands incorrectly during routing debugs, the network administrator can
configure the logging synchronous global configuration command and the logging synchronous command
under the vty. These actions help manage the logging output on the terminal, preventing it from interrupting the
command typing process3. References: Cisco exam emulator
NEW QUESTION: 95
Drag and drop characteristics of PIM dense mode from the left to the right.
Answer:
Explanation:
A picture containing diagram Description automatically generated
PIM-DM supports only source trees - that is, (S,G) entries-and cannot be used to build a shared distribution
tree.
Reference:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipmulti_pim/configuration/xe-16-5/imc-pim-xe-16-5-book/im
PIM dense mode (PIM-DM) uses a push model to flood multicast traffic to every corner of the network. This
push model is a brute-force method of delivering data to the receivers. This method would be efficient in certain
deployments in which there are active receivers on every subnet in the network. PIM-DM initially floods
multicast traffic throughout the network. Routers that have no downstream neighbors prune the unwanted
traffic. This process repeats every 3 minutes.
A rendezvous point (RP) is required only in networks running Protocol Independent Multicast sparse mode
(PIM-SM).
In PIM dense mode (PIM-DM), multicast traffic is initially flooded to all segments of the network. Routers that
have no downstream neighbors or directly connected receivers prune back the unwanted traffic.
NEW QUESTION: 96
What is one difference between EIGRP and OSPF?
A. OSPF is a Cisco proprietary protocol, and EIGRP is an IETF open standard protocol.
B. OSPF uses the DUAL distance vector algorithm, and EIGRP uses the Dijkstra link-state algorithm
C. EIGRP uses the variance command lot unequal cost load balancing, and OSPF supports unequal cost
balancing by default.
D. EIGRP uses the DUAL distance vector algorithm, and OSPF uses the Dijkstra link-state algorithm
Answer: (SHOW ANSWER)
EIGRP (Enhanced Interior Gateway Routing Protocol) uses the Diffusing Update Algorithm (DUAL) to calculate
the shortest path to each network and allows for unequal cost load balancing with the variance command.
OSPF (Open Shortest Path First), on the other hand, uses the Dijkstra algorithm to build a shortest-path tree for
each route and does not support unequal cost load balancing by default. References: The Implementing and
Operating Cisco Service Provider Network Core Technologies (SPCOR) source book would contain more
information on the differences between EIGRP and OSPF, including their algorithms and load balancing
capabilities.
NEW QUESTION: 97
Which element enables communication between guest VMs within a virtualized environment?
A. hypervisor
B. vSwitch
C. virtual router
D. pNIC
Answer: (SHOW ANSWER)
The vSwitch, or virtual switch, is the component that enables communication between guest VMs within a
virtualized environment. It operates at the data link layer (Layer 2) of the OSI model and allows virtual machines
on the same host to communicate with each other as if they were connected to the same physical switch. The
vSwitch can also connect to physical switches to facilitate communication between VMs and the external
network.
References:
* The concept of vSwitch is covered in the Cisco course "Implementing and Operating Cisco Service Provider
Network Core Technologies (SPCOR)" where it discusses the role of virtualization in modern network
environments.
* Additional information can be found in the Cisco documentation and training materials available on the Cisco
Learning Network Store, specifically in the course materials for SPCOR.
NEW QUESTION: 98
Drag and drop the characteristics from the left onto the infrastructure deployment models on the right.
Answer:
Explanation:
Graphical user interface, text, application Description automatically generated
NEW QUESTION: 99
Refer to the exhibit.
Which HTTP request produced the REST API response that was returned by Cisco DNA Center?
A. fetch /network-device?macAddress=ac:4a:56:6c:7c:00
B. POST/network-device?macAddress=ac:4a:56:6c:7c:00
C. GET/network-device?macAddress=ac:4a:56:6c:7c:00
Answer: (SHOW ANSWER)
The REST API response in the exhibit was returned by Cisco DNA Center as a result of an HTTP GET request.
This can be inferred from the "200 OK" status code, which typically indicates that the server has successfully
processed the request for information. In this case, information about a network device with a specific MAC
address is being requested. References := Cisco Service Provider Network Core Technologies
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The configuration required to set up a GRE tunnel between the HQ and BR routers is found in Option C. This
configuration specifies the tunnel source as the IP address of the interface on the HQ router, and the tunnel
destination as the IP address of an interface on the BR router. The ip address command assigns an IP address
to the tunnel interface itself. This setup allows for the encapsulation and de-encapsulation of traffic between the
two routers, enabling them to communicate over the GRE tunnel.
Answer:
After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to
be removed. What is the reason for this behavior?
A. The source-interface is configured incorrectly.
B. The destination must be 172.30.30.2 for icmp-echo
C. The default route is missing the track feature
D. The threshold value is wrong.
Answer: (SHOW ANSWER)
The issue described indicates that even though 172.20.20.2 stops responding to ICMP echoes, the default
route does not get removed as expected. This suggests a problem with the tracking configuration of the route.
The correct implementation should include associating the tracked object with the routing configuration so that if
the tracked object goes down, it triggers the removal of the associated route. Since option C points out that the
default route lacks this association with tracking, it is identified as the cause of the issue.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
A. memory
B. bandwidth
C. IP address
D. processor
E. storage
F. secure access
Answer: (SHOW ANSWER)
A hypervisor is responsible for managing the virtual machines running on a host system. It must provide the
following resources to the virtual machines:
* Memory: The hypervisor allocates physical RAM to virtual machines, allowing them to operate as if they have
their own dedicated memory.
* Processor: The hypervisor schedules CPU time for virtual machines, ensuring they have the processing
power needed to run their applications.
* Storage: The hypervisor provides access to storage resources, such as hard drives or storage area networks,
so that virtual machines can store data and applications.
References: Use local resources on Hyper-V virtual machine with VMConnect2, Configure Your Resource
Allocation Settings in vSphere3.
CR2 and CR3 ate configured with OSPF. Which configuration, when applied to CR1. allows CR1 to exchange
OSPF Information with CR2 and CR3 but not with other network devices or on new Interfaces that are added to
CR1?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves
this goal?
A. line vty 0 15
absolute-timeout 600
B. line vty 0 15
exec-timeout
C. line vty 01 5
exec-timeout 10 0
D. line vty 0 4
exec-timeout 600
Answer: (SHOW ANSWER)
The exec-timeout command is used to configure the timeout for the exec session on a Cisco router or switch.
This command takes two arguments: the first is the timeout in minutes, and the second is the timeout in
seconds. To meet the security policy of terminating all idle-exec sessions in 600 seconds (which equals to 10
minutes), option C "line vty 0 4 exec-timeout 10 0" should be used. This configuration sets an exec timeout of
ten minutes and zero seconds on vty lines from zero to four, effectively meeting the security policy requirement.
References := For further details, you can refer to Cisco's official documentation on the exec-timeout command
here.
MTU has been configured on the underlying physical topology, and no MTU command has been configured on
the tunnel interfaces. What happens when a 1500-byte IPv4 packet traverses the GRE tunnel from host X to
host Y, assuming the DF bit is cleared?
A. The packet arrives on router C without fragmentation.
B. The packet is discarded on router A
C. The packet is discarded on router B
D. The packet arrives on router C fragmented.
Answer: (SHOW ANSWER)
When a 1500-byte IPv4 packet traverses a GRE tunnel, and the DF (Don't Fragment) bit is cleared, the packet
can be fragmented if necessary. However, since the MTU on the physical interfaces underlying the tunnel is set
to 1500 bytes and there is no MTU command applied on the tunnel interfaces, the packet will not need to be
fragmented. Therefore, it will arrive at router C without fragmentation. References := Implementing and
Operating Cisco Service Provider Network Core Technologies source book and official Cisco documentation.
Explanation:
Diagram Description automatically generated
Refer to the exhibit. What is the value of the variable list after the code is run?
A. [1, 2, 10]
B. [1, 2, 3, 10]
C. [1, 2, 10, 4]
D. [1, 10, 10, 10]
Answer: (SHOW ANSWER)
The code snippet modifies a Python list by changing the fourth element (index 3) from 4 to 10. Therefore, the
final list is [1, 2, 10, 4].
An engineer must create a configuration that prevents R3from receiving the LSA about 172.16.1.4/32.Which
configuration set achieves this goal?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
The goal is to prevent R3 from receiving the LSA about 172.16.1.4/32. To achieve this, a prefix-list is used to
filter out the specific LSA updates in OSPF routing. Option C shows a configuration on router R3 that denies the
prefix 172.16.1.4/32 using a prefix-list named INTO-AREA1, which is then applied to OSPF area 0 with the
'area 1 filter-list prefix INTO-AREA1 in' command. References: Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR) v1.0 - This content can be found within the official Cisco
SPCOR study materials, where it discusses OSPF routing and route filtering using prefix lists.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Refer to the exhibit. What is printed to the console when this script is run?
A. a key-value pair in tuple type
B. a key-value pair in list type
C. a key-value pair in string type
D. an error
Answer: (SHOW ANSWER)
The script defines a dictionary of VLANs with their associated IP addresses and then prints each key-value pair
from this dictionary. In Python, when you iterate over a dictionary using the .keys() method and print both key
and value, it will be displayed as tuple type because it's printing two immutable elements together.
NEW QUESTION: 129
A technician is assisting a user who cannot connect to a website. The technician attempts to ping the default
gateway and DNS server of the workstation. According to troubleshooting methodology, this is an example of:
A. a divide-and-conquer approach.
B. a bottom-up approach.
C. a top-to-bottom approach.
D. implementing a solution.
Answer: (SHOW ANSWER)
This approach involves isolating the problem to a specific component or area, which in this case is the
connectivity to the default gateway and DNS server. By testing these individual elements, the technician can
determine if the issue lies within the local network or if it's related to external factors such as DNS resolution.
References: The concept of divide-and-conquer is a fundamental troubleshooting methodology discussed in the
context of network troubleshooting in the Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) course1.
An engineer configures monitoring on SW1 and enters the show command to verify operation. What does the
output confirm?
A. SPAN session 1 monitors activity on VLAN 50 of a remote switch
B. SPAN session 2 only monitors egress traffic exiting port FastEthernet 0/14.
C. SPAN session 2 monitors all traffic entering and exiting port FastEthernet 0/15.
D. RSPAN session 1 is incompletely configured for monitoring
Answer: (SHOW ANSWER)
The output would typically show that RSPAN session 1 is incompletely configured if it does not display any
source or destination ports or VLANs for monitoring. RSPAN (Remote Switched Port Analyzer) sessions are
used to monitor traffic on one or more source ports and send the monitored traffic to a destination port on a
remote switch. An incomplete configuration means that the session is not fully set up to capture and forward
traffic as intended. References := Implementing and Operating Cisco Service Provider Network Core
Technologies
A. Option A
B. Option D
C. Option C
D. Option B
Answer: (SHOW ANSWER)
Answer:
See the solution below.
Explanation:
R1
enable
Config t
Int loop0
Ip ospf 1 area 0
Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point
copy run start
R2
Enable
Config t
Int loop0
Ip ospf 1 area 0
Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point
Int et0/1
Ip ospf 1 area 0
Ip ospf network point-to-point
copy run start
R3
Enable
Config t
Int loop0
Ip ospf 1 area 0
Int et0/1
Ip ospf 1 area 0
Ip ospf network point-to-point
copy run start
Verification:-
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
NEW QUESTION: 137
A network engineer must configure a switch to allow remote access for all feasible protocols. Only a password
must be requested for device authentication and all idle sessions must be terminated in 30 minutes. Which
configuration must be applied?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C (LEAVE A REPLY)
To allow remote access for all feasible protocols while only requesting a password for device authentication and
terminating all idle sessions in 30 minutes, the configuration must include setting up lines for remote access
protocols like Telnet or SSH, specifying a password for login authentication, and configuring an exec-timeout of
30 minutes. This ensures that users can remotely access the switch using various protocols, are authenticated
using a password, and that any idle sessions are automatically terminated after the specified time to maintain
security.
A. 15
B. 20
C. 25
D. 10
Answer: (SHOW ANSWER)
The recommended minimum Signal-to-Noise Ratio (SNR) for Voice applications in networks is 25 dB. This level
of SNR ensures that voice traffic has sufficient quality and clarity, reducing the likelihood of data corruption and
retransmissions. References := Cisco Meraki Documentation: Signal-to-Noise Ratio (SNR) and Wireless Signal
Strength4
https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Signal-to-Noise_Ratio_(SNR)_and_W
Refer to the exhibit. What does the error message relay to the administrator who is trying to configure a Cisco
IOS device?
A. A NETCONF request was made for a data model that does not exist.
B. The device received a valid NETCONF request and serviced it without error.
C. A NETCONF message with valid content based on the YANG data models was made, but the request failed.
D. The NETCONF running datastore is currently locked.
Answer: (SHOW ANSWER)
Reference:
https://www.cisco.com/c/en/us/support/docs/storage-networking/management/200933-YANG-NETCONF-Confi
NEW QUESTION: 142
Refer to the exhibit. A network engineer must load balance traffic that comes from the NAT Router and is
destined to 10.10.110.10, to several FTP servers. Which two commands sets should be applied? (Choose two).
A.
B.
C.
D.
E.
Answer: (SHOW ANSWER)
In a Cisco network, load balancing to multiple FTP servers can be achieved using Network Address Translation
(NAT) along with load balancing techniques such as round-robin or least connections. The configuration would
involve defining a NAT pool with the IP addresses of the FTP servers and setting up appropriate NAT rules to
distribute incoming traffic among these servers. Additionally, routing protocols and interface configurations play
a role in ensuring efficient traffic distribution and failover.
Refer to the exhibit An engineer is troubleshooting a newly configured BGP peering that does not establish
What is the reason for the failure?
A. BGP peer 10 255 255 3 is not configured for peenng wth R1
B. Mandatory BOP parameters between R1 and 10 255 255 3 are mismatched
C. A firewall is blocking access to TCP port 179 on the BGP peer 10 255 255.3
D. Both BGP pern are configured for passive TCP transport
Answer: (SHOW ANSWER)
The exhibit indicates that the BGP peering is not established, which is evident from the "Destination
unreachable; gateway or host down" message when attempting to telnet to port 179 on the BGP peer
10.255.255.3 from the R1 router interface lo0 (loopback0). This message typically signifies that a firewall is
blocking access to TCP port 179, which is essential for BGP peering.
Answer:
Explanation:
NEW QUESTION: 149
A. EAP-TLS
B. PEAP
C. LDAP
D. EAP-FAST
Answer: (SHOW ANSWER)
For RADIUS-Based Authentication where EAP MS-CHAPv2 is configured on a client device, the outer method
protocol that must be configured on the ISE to support this authentication type is PEAP (B). PEAP
encapsulates the EAP MS-CHAPv2 within a secure TLS tunnel, providing an additional layer of protection for
the authentication process. References: The use of PEAP with EAP MS-CHAPv2 is part of the RADIUS
authentication mechanisms taught in the SPCOR training1.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Company policy restricts VLAN 10 to be allowed only on SW1 and SW2. All other VLANs can be on all three
switches. An administrator has noticed that VLAN 10 has propagated to SW3. Which configuration corrects the
issue?
A. SW1(config)#intgi1/1
SW1(config)#switchport trunk allowed vlan 1-9,11-4094
B. SW2(config)#intgi1/2
SW2(config)#switchport trunk allowed vlan 10
C. SW2(config)#int gi1/2
SW2(config)#switchport trunk allowed vlan 1-9,11-4094
D. SWl(config)#intgi1/1
SW1(config)#switchport trunk allowed vlan 10
Answer: (SHOW ANSWER)
The issue is that VLAN 10 has propagated to SW3, which is against the company policy. The company policy
allows only VLAN 10 on SW1 and SW2. To correct this issue, the allowed VLANs on the trunk link connecting
to SW3 should be configured to exclude VLAN 10. Option C accomplishes this by configuring the trunk link on
SW2 (int gi1/2) to allow all VLANs except VLAN 10 (switchport trunk allowed vlan
1-9,11-4094).
References :=
* Implementing and Operating Cisco Service Provider Network Core Technologies
* On-Demand E-Learning
R2 is the neighboring router of R1. R2 receives an advertisement for network 192 168.10.50/32. Which
configuration should be applied for the subnet to be advertised with the original /24 netmask?
A.
B.
C.
D.
Answer: B (LEAVE A REPLY)
These commands have been added to the configuration of a switch Which command flags an error if it is added
to this configuration?
A. monitor session 1 source interface port-channel 6
B. monitor session 1 source vlan 10
C. monitor session 1 source interface FatEtheret0/1 x
D. monitor session 1 source interface port-channel 7,port-channel8
Answer: (SHOW ANSWER)
The error will be flagged when trying to add the command "monitor session 1 source interface FatEthernet0/1
tx" because there is a typo in the interface name. It should be "FastEthernet" not "FatEthernet". In Cisco IOS,
the correct syntax and spelling are crucial for the commands to be accepted and executed. Any typos or
incorrect syntax will result in an error.
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the
network?
A. text string
B. username and password
C. certificate
D. RADIUS token
Answer: (SHOW ANSWER)
The WLAN security settings indicate that the PSK (Pre-Shared Key) is enabled, which typically requires a
passphrase or text string for authentication. However, since the question specifies that the configuration is
based on the exhibit, and without the ability to view the exhibit, it's not possible to provide a definitive answer.
Generally, if PSK is used, a text string would be the method for clients to authenticate to the network.
If 802.1X is enabled, then username and password would be used. References := Implementing and Operating
Cisco Service Provider Network Core Technologies
After configuring the BGP network, an engineer verifies that the path between Servers and Server2 Is
functional. Why did RouterSF choose the route from RouterDAL instead of the route from RouterCHI?
A. The Router-ID Tor Router DAL is lower than the Roter-ID for RouterCHI.
B. The route from RouterOAL has a lower MED.
C. BGP is not running on RouterCHI.
D. There is a static route in RouterSF for 10.0.0.0/24.
Answer: B (LEAVE A REPLY)
In BGP, the Multi-Exit Discriminator (MED) attribute is used to inform external neighbors about the preferred
path into an AS when multiple entry points exist. A lower MED value is preferred over a higher one.
Therefore, if RouterDAL advertises a route to the 10.0.0.0/24 network with a lower MED compared to
RouterCHI, RouterSF will choose the route from RouterDAL. This is assuming all other attributes are equal and
there is no more specific route or policy in place that would override the MED consideration.
Answer:
Explanation:
obj = json.JSONEncoder().encode(data)
Refer to the exhibit. The DevOps team noticed missing NetFlow data during peak utilization times for remote
branches. Which configuration allows for this issue to be minimized or resolved?
A. Configure NetFlow on the in and outbound directions.
B. Change the transport type from UDP to TCP.
C. Configure long byte counters when specifying a flow record.
D. Change the flow monitor to IPv6 from IPv4.
Answer: (SHOW ANSWER)
Configuring NetFlow on both inbound and outbound directions can help in capturing all the traffic flow data,
thereby minimizing or resolving the issue of missing NetFlow data during peak utilization times. This ensures
that all entering and exiting traffic is accounted for, providing a more comprehensive view of the network's
utilization.
References:
* Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) training and
certification course1.
* Cisco Service Provider Network Core Technologies (SPCOR) v1.0 course overview2.
* Cisco 350-501 SPCOR exam topics3.
Answer:
Explanation:
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Which HTTP JSON response does the python code output give?
A. NameError: name 'json' is not defined
B. KeyError 'kickstart_ver_str'
C. 7.61
D. 7.0(3)I7(4)
Answer: (SHOW ANSWER)
The Python code in the exhibit is likely making a request to a Cisco device's API and attempting to parse the
JSON response to extract the 'kickstart_ver_str' value. The correct answer is C, 7.61, which suggests that the
JSON response contains a dictionary with a key 'kickstart_ver_str' that has a value of '7.61'. This version
number corresponds to the kickstart version string of the Cisco NX-OS software.
A. BFD is used with first hop routing protocols to provide subsecond convergence.
B. BFD is more CPU-intensive than using reduced hold timers with routing protocols.
C. BFD is used with dynamic routing protocols to provide subsecond convergence.
D. BFD is used with NSF and graceful to provide subsecond convergence.
Answer: (SHOW ANSWER)
When using BFD in a network design, it is important to consider that BFD is used with dynamic routing
protocols to provide subsecond convergence. BFD is a low-overhead, short-duration method of detecting
failures in the forwarding path between two adjacent routers, which allows for rapid failure detection and quick
rerouting of traffic.
Explanation:
Graphical user interface, text, application Description automatically generated
A.
B.
C.
D.
Answer: (SHOW ANSWER)
To prevent traffic from the Finance VLAN from traversing SwitchC, the appropriate command would be to
remove the VLAN associated with Finance from the allowed list on the trunk link connecting SwitchC to the
Core switch. This can be achieved by using the switchport trunk allowed vlan remove command followed by the
VLAN number. This command modifies the list of VLANs allowed on a trunk interface, effectively preventing
any traffic from the specified VLAN from passing through the trunk.
Refer to the exhibit Drag and drop the snippets into the RESTCONF request to form the request that returns
this response Not all options are used
Answer:
Explanation:
The OSPF neighborship fails between two routers. What is the cause of this issue?
A. The OSPF router ID is missing on this router.
B. The OSPF process is stopped on the neighbor router.
C. There is an MTU mismatch between the two routers.
D. The OSPF router ID is missing on the neighbor router.
Answer: (SHOW ANSWER)
The OSPF neighborship fails between two routers due to an MTU mismatch. In OSPF, for a neighborship to be
established, the MTU size on the interfaces that connect neighboring routers should match. If there is a
mismatch in the MTU size, OSPF adjacency will not form. In the provided exhibit, it can be observed from the
log messages that there is an MTU mismatch error (mtu 9100 state EXSTART), indicating that this is the
reason for OSPF neighborship failure. References := Cisco - Implementing and Operating Cisco Service
Provider Network Core Technologies
What does the output confirm about the switch's spanning tree configuration?
A. The spanning-tree mode stp ieee command was entered on this switch
B. The spanning-tree operation mode for this switch is IEEE.
C. The spanning-tree operation mode for this switch is PVST+.
D. The spanning-tree operation mode for this switch is PVST
Answer: (SHOW ANSWER)
The output confirms that the switch is running Per-VLAN Spanning Tree Plus (PVST+), which is indicated by
the presence of a unique Spanning Tree instance for VLAN 20. PVST+ is a Cisco enhancement of the original
IEEE 802.1D Spanning Tree Protocol (STP) that provides for separate 802.1D spanning trees for each VLAN
configured in the network; this allows for better load balancing.
References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) v1.1
A. line vty 0 15
login local
transport input none
B. line vty 0 15
login local
transport input telnet ssh
C. line vty 0 15
login local
transport input ssh
D. line vty 0 15
login local
transport input all
Answer: C (LEAVE A REPLY)
To ensure secure and reliable remote access for device administration, the configuration must specify SSH as
the only protocol allowed for remote access. This is achieved by using the transport input ssh command, which
configures the vty lines to accept only SSH connections, thus ensuring that all remote access is encrypted and
secure
An engineer applies this configuration to router R1. How does R1 respond when the user 'cisco' logs in?
A. It displays the startup config and then permits the user to execute commands
B. It places the user into EXEC mode and permits the user to execute any command
C. It displays the startup config and then terminates the session.
D. It places the user into EXEC mode but permits the user to execute only the show startup-config command
Answer: (SHOW ANSWER)
When the user 'cisco' logs in, router R1 will place the user into EXEC mode and permit the user to execute any
command. This is because the configuration applied to the router determines the level of access granted to the
user upon login. In Cisco routers, EXEC mode provides a higher level of access where users can execute
various commands to configure and manage the device.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Refer to the exhibit. Which two commands ensure that DSW1 becomes root bridge for VLAN 10? (Choose two)
A. DSW1(config)#spanning-tree vlan 10 priority 4096 Most Voted
B. DSW1(config)#spanning-tree vlan 10 priority root
C. DSW2(config)#spanning-tree vlan 10 priority 61440 Most Voted
D. DSW1(config)#spanning-tree vlan 10 port-priority 0
E. DSW2(config)#spanning-tree vlan 20 priority 0
Answer: (SHOW ANSWER)
To ensure that DSW1 becomes the root bridge for VLAN 10, the commands A and B should be used.
Command A DSW1(config)#spanning-tree vlan 10 priority 4096 sets the priority of DSW1 to a lower value
making it more likely to become the root bridge as in STP (Spanning Tree Protocol), the switch with the lowest
priority value becomes the root bridge. Command B DSW1(config)#spanning-tree vlan 10 priority root is a
macro that automatically sets the switch's priority to ensure it becomes the root for VLAN 10.
References := Cisco
Explanation:
Answer:
Explanation:
Graphical user interface, application Description automatically generated
NEW QUESTION: 193
An administrator configures two switches with LACP EtherChannels, but packets are not being exchanged
between the switches.
What is the reason, and what fixes the issue?
S1> enable
S1# configure terminal
S1(config)# interface port-channel 1
S1(config-if)# ip address 10.1.1.1 255.2
S1(config-if)# interface g2/0/0
S1(config-if)# no ip address
S1(config-if)# channel-group 1 mode active
S1(config-if)# exit
S1(config)# interface g4/0/0
S1(config-if)# no ip address
S1(config-if)# channel-group 1 mode active
S2> enable
S2# configure terminal
S2(config)# interface port-channel 1
$2(config-if)# ip address 10.1.1.2 255.255.255.0
S2(config-if)# interface g2/0/0
$2(config-if)# no ip address
$2(config-if)# channel-group 1 mode desirable
S2(config-if)# exit
S2(config)# interface g4/0/0
S2(config-if)# no ip address
S2(config-if)# channel-group 1 mode desirable
A. S2 is configured as LACP. Change the channel group mode to passive
B. S2 is configured with PAgP. Change the channel group mode to active.
C. S1 is configured with LACP. Change the channel group mode to on
D. S1 is configured as PAgP. Change the channel group mode to desirable
Answer: (SHOW ANSWER)
The correct answer is C because when S1 is configured with LACP (Link Aggregation Control Protocol), the
channel group mode should be set to 'on' to force the interface to channel without LACP negotiation. This is
based on the understanding of LACP operation within the Service Provider network infrastructures, where
LACP is used to aggregate multiple network interfaces into a single logical link to increase bandwidth and
provide redundancy. References: Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) training materials
A.
B.
C.
D.
Answer: C (LEAVE A REPLY)
The configuration in Option C enables a device to be configured via NETCONF over SSHv2. This is evident as
it includes the "netconf ssh" command, which is essential for enabling NETCONF over SSH. The configuration
also includes other necessary commands like setting the hostname, username, and password, generating
crypto keys, and specifying the IP domain name and SSH version.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Refer to the exhibit. A network engineer troubleshoots an issue with the port channel between SW1 and SW2.
which command resolves the issue?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
Explanation:
Which two commands ensure that DSW1 becomes the root bridge for VLAN 10 and 20? (Choose two.)
A. spanning-tree mst 1 priority 1
B. spanning-tree mstp vlan 10.20 root primary
C. spanning-tree mil 1 root primary
D. spanning-tree mst 1 priority 4096
E. spanning-tree mst vlan 10.20 priority root
Answer: (SHOW ANSWER)
The question pertains to configuring DSW1 as the root bridge for VLAN 10 and 20. In the context of MST
(Multiple Spanning Tree), the priority values determine which switch becomes the root bridge, with lower values
indicating higher priority. Options A and D are correct because they set the priority for MST instance 1, which
can be mapped to VLANs 10 and 20, ensuring DSW1 has a lower priority and thus becomes the root bridge.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C (LEAVE A REPLY)
The correct Python code to display the value of the "hostname" key from the router's API output in JSON format
is option C. In this option, json_data = response.json() is used to parse the JSON response into a Python
dictionary. Then, print(json_data['response'][0]['hostname']) is used to print the value associated with the
"hostname" key that is nested inside a list which is the value of the "response" key.
Answer:
Explanation:
NEW QUESTION: 203
Which characteristic distinguishes Ansible from Chef?
A. Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode.
B. Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.
C. Ansible pushes the configuration to the client. Chef client pulls the configuration from the server.
D. The Ansible server can run on Linux, Unix or Windows. The Chef server must run on Linux or Unix.
Answer: (SHOW ANSWER)
Ansible and Chef are both automation tools used for configuration management, but they differ in their
operation. Ansible uses a push model, where the server pushes configurations to the clients. In contrast, Chef
uses a pull model, where the clients pull configurations from the server. This operational difference is key in
distinguishing Ansible from Chef.
References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) -
Section on automation tools comparison.
C)
D)
E)
A. Option E
B. Option D
C. Option C
D. Option B
E. Option A
Answer: (SHOW ANSWER)
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The access list in Option A is specifically designed to prevent wireless guest users from bypassing the splash
page by denying IP traffic from the Cisco ISE server addresses (10.9.11.141 and 10.1.11.141) and then
permitting TCP traffic on ports typically used for web services (80 and 443). This ensures that users are
redirected to the splash page when attempting to access web services.
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
To enable R1 to reach the server at 172.16.0.1, the correct VRF configuration must be applied to ensure that
routing instances are separated and that R1 has the necessary routes to reach the server in a different VRF
domain. Option C shows the configuration where interface Ethernet0/0 is associated with VRF 'hotel' and OSPF
is configured correctly with network statements under router ospf 44 vrf hotel, which includes the server's IP
address range. References := Implementing and Operating Cisco Service Provider Network Core Technologies
(SPCOR) source book or official Cisco documentation related to VRF configuration and OSPF in a service
provider environment.
Refer to the exhibit. Which command filters the ERSPAN session packets only to interface GigabitEthernet1?
A. source ip 10.10.10.1
B. source interface gigabitethernet1 ip 10.10.10.1
C. filter access-group 10
D. destination ip 10.10.10.1
Answer: (SHOW ANSWER)
The command "filter access-group 10" is used to filter the ERSPAN session packets only to interface
GigabitEthernet1. In the provided configuration snippet, an access list (numbered 10) is defined to permit traffic
from IP address 10.10.10.1. This access list is then applied as a filter to the ERSPAN session using the
"filter access-group 10" command, ensuring that only packets matching the criteria of the access list are
captured in the ERSPAN session. References := Cisco's official documentation on configuring ERSPAN
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
A.
B.
C.
D.
Answer: (SHOW ANSWER)
To analyze traffic from the file server with a packet analyzer on switch SW1, the network engineer would need
to configure a SPAN (Switched Port Analyzer) session. This involves specifying the source interface from which
traffic will be mirrored and the destination interface where the packet analyzer is connected. The correct
commands to achieve this are found in Option C, which includes setting up the monitor session with the
appropriate source and destination interfaces.
Refer to the exhibit. Which result does the python code achieve?
A. The code converts time to the yyyymmdd representation.
B. The code encrypts a base64 decrypted password.
C. The code converts time to the "year/month/day" time format.
D. The code converts time to the Epoch LINUX time format.
Answer: (SHOW ANSWER)
An engineer reconfigures the pot-channel between SW1 and SW2 from an access port to a trunk and
immediately notices this error in SW1's log.
Which command set resolves this error?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
When reconfiguring an access port to a trunk, the error shown in SW1's log indicates that there is a mismatch
in the allowed VLANs on the trunk. To resolve this error, the allowed VLANs on both sides of the port-channel
must be consistent. Option C is the correct command set because it specifies the allowed VLANs on the trunk
to include VLANs 10 and 20, which must match on both switches to form a successful trunk link.
Refer to the exhibit. Which configuration must be added to enable GigabitEthemet 0/1 to participate in OSPF?
A. SF_router (config-router)# network 10.10.1.0 0.0.0.255 area 0
B. SF_rouier (conng)# network 10.10.1.0 0.0.0.255 area 1
C. SF_router (conflg-routerp) network 10.10.1.0 0.0.0.255 area 1
D. SF_rouler (contlg-rouler)# network 10.10.1.0 255.255.255.0 area 0
Answer: A (LEAVE A REPLY)
In OSPF (Open Shortest Path First) configuration, the 'network' command is used to specify which interfaces
will participate in OSPF, and to define the area assignment for those interfaces. The correct syntax for the
'network' command includes the network address followed by a wildcard mask, and then the area ID.
In this case, GigabitEthernet 0/1 has an IP address of 10.10.1.1 with a subnet mask of 255.255.255.0, which
corresponds to a wildcard mask of 0.0.0.255 (the inverse of the subnet mask). Since we want this interface to
participate in Area 0, as indicated by the exhibit showing it within Area 0's boundary, option A is correct.
Answer:
Explanation:
NEW QUESTION: 221
Refer to the exhibit. An engineer must save the configuration of router R2 using the NETCONF protocol.
Which script must be used?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
The NETCONF protocol is used for managing network device configurations and utilizes XML-based data
encoding for both the configuration data and protocol messages. To save the configuration of router R2 using
NETCONF, the script must be able to perform the necessary remote procedure calls (RPCs) to manipulate the
device's configuration. Option C provides the correct sequence of RPCs to save the configuration according to
the NETCONF protocol standards as defined in RFC 62411.
An engineer configures VRRP and issues the show commands to verify operation. What does the engineer
confirm about VRRP group 1 from the output?
A. There is no route to 10.10.1.1/32 in R2's routing table
B. If R1 reboots, R2 becomes the master virtual router until R2 reboots
C. Communication between VRRP members is encrypted using MD5
D. R1 is primary if 10.10.1.1/32 is in its routing table
Answer: (SHOW ANSWER)
VRRP (Virtual Router Redundancy Protocol) allows for the automatic assignment of available IP routers to
participating hosts. In this case, the output shows that R1 has a higher priority set (110) over the default priority
(which is typically 100), making it the primary router for VRRP group 1 as long as it has the IP address
10.10.1.1/32 in its routing table, which would make it reachable according to the 'track' statement configuration.
VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for
VLAN 50 and SW1 is the VTP server Which command ensures that SW3 receives frames only from VLAN
50?
A. SW1 (config)#vtp pruning
B. SW3(config)#vtp mode transparent
C. SW2(config)=vtp pruning
D. SW1 (config)=vtp mode transparent
Answer: (SHOW ANSWER)
VTP pruning enhances network bandwidth use by reducing unnecessary flood traffic. It does not forward
broadcasts intended for VLANs across trunk links if there are no active ports in that VLAN on the downstream
switches. So, enabling VTP pruning on SW1 ensures that SW3 receives frames only from VLAN 50 as all its
access ports are configured for VLAN 50.
What does the response "204 No Content mean for the REST API request?
A. Interface toopback 100 is not removed from the configuration.
B. Interface toopback 100 is not found in the configuration.
C. Interface toopback 100 is removed from the configuration.
D. The DELETE method is not supported.
Answer: (SHOW ANSWER)
The response "204 No Content" for the REST API request indicates that the server has successfully processed
the request, and as a result, the specified resource (Interface loopback 100) has been removed from the
configuration. This HTTP response code is typically used to confirm that an action has been completed
successfully, but there is no additional content to send in the response payload.
Refer to the exhibit. An engineer configures a new HSRP group. While reviewing the HSRP status, the
engineer sees the logging message generated on R2. Which is the cause of the message?
A. The same virtual IP address has been configured for two HSRP groups
B. The HSRP configuration has caused a spanning-tree loop
C. The HSRP configuration has caused a routing loop
D. A PC is on the network using the IP address 10.10.1.1
Answer: (SHOW ANSWER)
The logging message "HSRP-5-DUPADDR: Duplicate address 10.10.1.1 on FastEthernet0/0, sourced by
0000.0c07.ac02" indicates that there is another device on the network with the IP address that has been
configured for HSRP group 50's virtual IP address (10.10.1.1). This could be a PC or any other device that has
been assigned this IP address statically or dynamically, which conflicts with the HSRP virtual IP causing the
error message. References: Implementing and Operating Cisco Service Provider Network Core Technologies
(SPCOR) training materials would cover HSRP configuration and troubleshooting, including how to resolve
issues related to duplicate IP addresses.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Answer:
Explanation:
NEW QUESTION: 228
How does a fabric AP fit in the network?
A. It is in local mode and must be connected directly to the fabric border node
B. It is in FlexConnect mode and must be connected directly to the fabric edge switch.
C. It is in FlexConnect mode and must be connected directly to the fabric border node
D. It is in local mode and must be connected directly to the fabric edge switch.
Answer: (SHOW ANSWER)
In a Cisco network fabric, an AP (Access Point) in local mode is connected directly to a fabric edge switch.
This setup allows the AP to communicate with the fabric's control plane nodes, which are responsible for
managing and orchestrating the network fabric. The fabric edge switch serves as the access layer in the fabric
architecture, providing connectivity to endpoints like APs, while also interfacing with the fabric's core and
distribution layers.
References := Cisco's official documentation on network fabric
A. SD-Access transit
B. fabric interconnect
C. wireless transit
D. IP-based transit
E. SAN transit
Answer: (SHOW ANSWER)
To interconnect two Cisco SD-Access Fabric sites, two methods can be utilized: SD-Access transit and IP-
based transit. SD-Access transit leverages a native Cisco SD-Access fabric for domain-wide communication,
while IP-based transit uses traditional IP-based networks like VRF-LITE or MPLS, requiring remapping of VRFs
and SGTs between sites3.
References := Cisco Live - Cisco SD-Access Connecting Multiple Sites in a Single Fabric Domain
Cisco IOS Nonstop Forwarding(NSF) always runs with stateful switchover (SSO) and provides redundancy for
Layer 3 traffic.
Reference:
https://www.cisco.com/en/US/docs/switches/lan/catalyst3850/software/release/3se/consolidated_guide/b_consoli
What is the result when a switch that is running PVST+ is added to this network?
A. DSW2 operates in Rapid PVST+ and the new switch operates in PVST+
B. Both switches operate in the PVST+ mode
C. Spanning tree is disabled automatically on the network
D. Both switches operate in the Rapid PVST+ mode.
Answer: (SHOW ANSWER)
When a switch running Per-VLAN Spanning Tree Plus (PVST+) is added to a network with switches running
Rapid PVST+, the network supports both protocols simultaneously due to the backward compatibility of Rapid
PVST+ with PVST+. The existing switches will continue to operate using Rapid PVST+, while the newly added
switch will operate using its configured protocol, which is PVST+. This ensures that there is no disruption in
service and that spanning tree continues to prevent loops as expected.
Refer to the exhibit. A network engineer must be notified when a user switches to configuration mode. Which
script should be applied to receive an SNMP trap and a critical-level log message?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The script that should be applied to receive an SNMP trap and a critical-level log message when a user
switches to configuration mode is the one that uses the EEM (Embedded Event Manager) applet with specific
commands for SNMP trap generation and logging. The correct script would contain the event cli command to
specify the CLI event, action commands for sending an SNMP trap (snmp-trap) and for logging a message
(syslog) at a critical level.
A. switch fabric
B. VTEP
C. VNID
D. host switch
Answer: (SHOW ANSWER)
In a VXLAN environment, the VTEP (VXLAN Tunnel Endpoint) is responsible for maintaining Layer 2 isolation
between segments. The VTEP encapsulates Layer 2 frames within Layer 3 packets (using MAC-in-UDP
encapsulation) and uses a 24-bit VXLAN Network Identifier (VNID) to identify and maintain isolation between
different Layer 2 segments over a shared Layer 3 infrastructure123.
References := RFC 7348, Cisco Press resources on VXLAN
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
An engineer must configure a SPAN session. What is the effect of the configuration?
A. Traffic sent on VLANs 10, 11, and 12 is copied and sent to interface g0/1.
B. Traffic sent on VLANs 10 and 12 only is copied and sent to interface g0/1.
C. Traffic received on VLANs 10, 11, and 12 is copied and sent to Interface g0/1.
D. Traffic received on VLANs 10 and 12 only is copied and sent to interface g0/1.
Answer: (SHOW ANSWER)
The SPAN session configuration in the exhibit is designed to copy traffic received on specific VLANs to a
designated interface for monitoring purposes. The command monitor session 1 source vlan 10 - 12 rx indicates
that the source VLANs for the SPAN session are VLANs 10, 11, and 12, and the 'rx' keyword specifies that only
the traffic received on these VLANs will be monitored. The command monitor session 1 destination interface
gigabitethernet0/1 sets interface GigabitEthernet0/1 as the destination where the mirrored traffic will be sent.
Therefore, the effect of the configuration is that all traffic received on VLANs 10, 11, and 12 will be duplicated
and forwarded to interface g0/1 for analysis.
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The script should be completed with the code that opens a file in write mode for each device and writes the
configuration into it in JSON format. Option C is correct because it uses a context manager to open a file
named after the hostname variable with a .json extension. It then writes the device variable, which presumably
contains the device configuration, into this file using json.dump(), ensuring the data is in JSON format.
References:
* Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) course material
* Python documentation on file handling and the json module
* Cisco learning resources on network automation and scripting
Which two facts does the device output confirm? (Choose two.)
A. The device sends unicast messages to its peers
B. The device's HSRP group uses the virtual IP address 10.0.3.242
C. The standby device is configured with the default HSRP priority.
D. The device is using the default HSRP hello timer
E. The device is configured with the default HSRP priority
Answer: (SHOW ANSWER)
The output confirms that the device's HSRP group is using the virtual IP address 10.0.3.242, which is indicated
by the line "Virtual IP address is 10.0.3.242". This confirms option B.
Additionally, the device is configured with the default HSRP priority, which is 100 as shown in the line
"Priority 100 (cfgd 100)". Since this matches the default priority value for HSRP, it confirms option E.
A.
B.
C.
D.
Answer: (SHOW ANSWER)
Proper JSON data formatting is essential for ensuring that data is correctly structured and can be easily parsed
by systems. JSON data should be in a text-based format that follows specific syntax rules, such as key-value
pairs enclosed in curly braces
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
An engineer must configure HSRP for VLAN 1000 on SW2. The secondary switch must immediately take over
the role of active router If the interlink with the primary switch fails. Which command set completes this task?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
In the context of HSRP (Hot Standby Router Protocol), to ensure that a secondary switch takes over
immediately as the active router if the interlink with the primary switch fails, preempt must be enabled, and
tracking must be configured for the interface connecting to the primary switch. The correct command set would
configure HSRP for VLAN 1000 on SW2 with a lower priority than the primary (to make it secondary) and track
an interface or object that represents the interlink. If that tracked object goes down, it will decrement the priority
of SW2, potentially making it higher than SW1 and causing an immediate failover to SW2.
Explanation:
Text, letter Description automatically generated
NEW QUESTION: 261
Where is radio resource management performed in a cisco SD-access wireless solution?
A. DNA Center
B. control plane node
C. wireless controller
D. Cisco CMX
Answer: (SHOW ANSWER)
Radio Resource Management (RRM) is an essential feature that optimizes wireless network performance by
managing the radio frequencies in use. In a Cisco SD-Access wireless solution, RRM is performed by the
wireless controller. The controller continuously monitors and manages aspects such as radio frequency
assignment, power levels, and channel settings to ensure optimal performance and coverage for wireless
clients. It dynamically adjusts these settings based on the environment and network conditions to maintain the
best possible wireless experience.
Fabric wireless controllers manage and control the fabric-mode APs using the same general model as the
traditional local-mode controllers which offers the same operational advantages such as mobility control and
radio resource management. A significant difference is that client traffic from wireless endpoints is not tunnelled
from the APs to the wireless controller. Instead, communication from wireless clients is encapsulated in VXLAN
by the fabric APs which build a tunnel to their first-hop fabric edge node. Wireless traffic it tunneled to the edge
nodes as the edge nodes provide fabric services such as the Layer 3 Anycast Gateway, policy, and traffic
enforcement.
https://www.cisco.com/c/en/us/td/docs/solutions/CVD/Campus/cisco-sda-design-guide.html
Refer to the exibit. How should the programmer access the list of VLANs that are recevied via the API call?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
To access the list of VLANs received via the API call, the programmer should use the key 'Vlan1' within the
VlanNames dictionary. This method allows for direct access to the specific VLAN information required.
References := The explanation is derived from the Implementing and Operating Cisco Service Provider
Network Core Technologies training, which covers topics such as networking, automation, and quality of
services, relevant to handling VLANs and API calls
Which configuration elects SW4 as the root bridge for VLAN 1 and puts G0/2 on SW2 into a blocking state?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
To elect SW4 as the root bridge for VLAN 1, the priority value needs to be lower than any other switch in the
network for that VLAN. The default priority value is 32768, and by setting SW4's priority to 32768 for VLAN
1, it does not guarantee that SW4 will become the root bridge unless all other switches have their priorities set
higher or equal and have a higher MAC address. However, assuming all other factors are default, this could
make SW4 a candidate for being the root bridge if it has the lowest MAC address.
To put G0/2 on SW2 into a blocking state, we need to influence the Spanning Tree Protocol (STP) decisions.
This can be done by manipulating port costs or priorities to ensure that this port does not provide the best path
to the root bridge. By setting the spanning-tree cost of G0/2 on SW2 to 128, it increases the likelihood of this
port being selected as a non-designated port if there is another path with a lower cost.
Answer:
Explanation:
Diagram Description automatically generated
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Answer:
Explanation:
CLOUD1 and 3ON-PREMISES2 and 4
An engineer is installing a new pair of routers in a redundant configuration. Which protocol ensures that traffic is
not disrupted in the event of a hardware failure?
A. HSRPv1
B. GLBP
C. VRRP
D. HSRPv2
Answer: (SHOW ANSWER)
HSRPv1 (Hot Standby Router Protocol version 1) is designed to allow for transparent failover of the first-hop IP
router. HSRP provides high network availability by providing redundancy for IP traffic from hosts on networks.
In a group of router interfaces, the active router is the router of choice for routing packets; the standby router is
the router that takes over the routing duties when an active router fails or when preset conditions are met. This
ensures that traffic continues to flow even if one router fails, making it a suitable choice for the scenario
described in the question.
References:
* Configuring HSRP, VRRP, and GLBP - Cisco
* Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) - Cisco
Answer:
Explanation:
An LACP port channel is configured between Switch-1 and Switch-2, but It falls to come up. Which action will
resolve the issue?
A. Configure Switch-1 with channel-group mode active
B. Configure Switch-2 with channel-group mode desirable.
C. Configure Switch-1 with channel-group mode on.
D. Configure SwKch-2 with channel-group mode auto
Answer: (SHOW ANSWER)
The issue with the LACP port channel not coming up between Switch-1 and Switch-2 is due to both switches
being configured with "channel-group mode passive". For an LACP (Link Aggregation Control Protocol) to
establish a connection, at least one end must be configured to actively seek the establishment of a channel,
which is done by setting "channel-group mode active". In this case, configuring Switch-1 with "channel-group
mode active" will initiate the LACP negotiation process, allowing the port channel to come up.
Answer:
Explanation:
A picture containing application Description automatically generated
Answer:
Explanation:
priority 1: AAA servers of ACE group
priority 2: AAA servers of AAA_RADIUS group
priority 3: local configured username in case-sensitive format
priority 4: If no method works, then deny login
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Refer to the exhibit. A network engineer checks connectivity between two routers. The engineer can ping the
remote endpoint but cannot see an ARP entry. Why is there no ARP entry?
A. The ping command must be executed in the global routing table.
B. Interface FastEthernet0/0 Is configured in VRF CUST-A, so the ARP entry is also in that VRF.
C. When VRFs are used. ARP protocol must be enabled In each VRF.
D. When VRFs are used. ARP protocol is disabled in the global routing table.
Answer: (SHOW ANSWER)
In a scenario where Virtual Routing and Forwarding (VRF) is used, each VRF instance has its own separate set
of routing and forwarding tables. When an interface is assigned to a specific VRF, all Layer 2 activities including
ARP are limited to that particular VRF. Therefore, if you are trying to view the ARP table from the global routing
context, you will not see an entry for an IP address that belongs to a different VRF. In this case, since Interface
FastEthernet0/0 is part of VRF CUST-A, any ARP entries associated with it would only be visible within that
specific VRF's ARP table. References: Implementing and Operating Cisco Service Provider Network Core
Technologies (SPCOR) v1.1
A. SSL
B. MD5
C. AES128
D. AES256
Answer: (SHOW ANSWER)
NTP (Network Time Protocol) uses the MD5 (Message-Digest Algorithm 5) hashing algorithm for authentication
purposes. MD5 is utilized to create a hash value based on the time information being sent over the network.
This hash is then used to verify the integrity and authenticity of the NTP messages, ensuring that the time data
has not been tampered with during transit. While MD5 is not the most secure hashing algorithm available, it is
widely used in NTP implementations due to its balance of security and computational efficiency.
References := Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
A.
B.
C.
D.
Answer: (SHOW ANSWER)
A properly formatted JSON script is a text-based data format that follows JavaScript object syntax. It is
commonly used for transmitting data in web applications. A correct JSON format includes key-value pairs with
keys being strings and values being valid JSON data types such as strings, numbers, objects, arrays, booleans,
or null. It also requires proper use of quotes, commas, and braces. Based on the information provided, option C
is the correct answer as it is the only option that does not contain a URL, which is not a valid JSON format.
Refer to the exhibit. An engines configured TACACS^ to authenticate remote users but the configuration is not
working as expected Which configuration must be applied to enable access?
A.
B.
C.
D.
Answer: C (LEAVE A REPLY)
The correct configuration for enabling TACACS^ authentication for remote users involves specifying the
TACACS^ server details, including the IP address and the secret key, and applying the TACACS^ server group
to the line configuration. Option C shows the correct configuration where the tacacs-server host command is
used to define the TACACS^ server with its IP address and the key keyword to specify the shared secret. The
aaa group server tacacs+ command is used to create a server group, and the server-private command within
the group specifies the IP address of the TACACS^ server and the key.
Finally, the line vty configuration applies the server group to the VTY lines, which allows remote users to be
authenticated via TACACS^.
Only administrators from the subnet 10.10.10.0/24 are permitted to have access to the router. A secure protocol
must be used for the remote access and management of the router instead of clear-text protocols.
Which configuration achieves this goal?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: C (LEAVE A REPLY)
To restrict access to the router to only administrators from the subnet 10.10.10.0/24 and ensure that a secure
protocol is used, the configuration should include an access control list (ACL) that specifies the allowed subnet
and applies it to the vty lines. Additionally, it should specify the use of a secure protocol like SSH for remote
access. Here's an example configuration:
access-list 10 permit 10.10.10.0 0.0.0.255
line vty 0 4
login local
transport input ssh
access-class 10 in
This configuration creates an ACL that permits only the 10.10.10.0/24 subnet and applies it to the vty lines,
which are used for remote access to the router. It also specifies that only SSH is allowed as the input transport
protocol for these lines, ensuring secure communication.
The access points are failing to join the wireless LAN controller. Which action resolves the issue?
A. configure option 43 Hex F104.AC10.3205
B. configure option 43 Hex F104.CA10.3205
C. configure dns-server 172.16.50.5
D. configure dns-server 172.16.100.1
Answer: (SHOW ANSWER)
In the scenario described, the engineer needs to configure DHCP Option 43 to provide the management IP
address of the WLC in a format that the access points can understand. The correct configuration for Option 43
includes the IP address of the WLC in hexadecimal format. The management IP address of the WLC is
172.16.50.5, which translates to AC10.3205 in hexadecimal notation. The prefix F104 indicates that it is an IPv4
address and specifies its length (in this case, four bytes or one word). Therefore, configuring option 43 with Hex
F104.AC10.3205 will resolve the issue by directing access points to find and register with the WLC at IP
address 172.16.50.5.
Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on
switch1 to achieve the following results on port fa0/1?
A.
B.
C.
D.
Answer: B (LEAVE A REPLY)
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
A GRE tunnel has been created between HO and BR routers. What is the tunnel IP on the HQ router?
A. 10.111.111.1
B. 10.111.111.2
C. 209.165.202.130
D. 209.165.202.134
Answer: (SHOW ANSWER)
In a GRE tunnel configuration, the tunnel IP is the IP address assigned to the tunnel interface itself. This
address is used for sending traffic through the GRE tunnel from one end to another. Based on typical
configurations and best practices found in Cisco's Implementing and Operating Cisco Service Provider Network
Core Technologies (SPCOR), if we look at the exhibit provided, we can infer that since 10.111.111.2 is likely
assigned to the BR router's tunnel interface (as it is common practice to use sequential IPs for point-to-point
connections), then 10.111.111.1 would be assigned to the HQ router's tunnel interface.
Explanation:
NEW QUESTION: 307
What is the function of a fabric border node in a Cisco SD-Access environment?
A. To collect traffic flow information toward external networks
B. To connect the Cisco SD-Access fabric to another fabric or external Layer 3 networks
C. To attach and register clients to the fabric
D. To handle an ordered list of IP addresses and locations for endpoints in the fabric.
Answer: (SHOW ANSWER)
The error message indicates an MD5 authentication failure between the two BGP peers. The IP addresses
involved are 10.10.10.1 and 10.120.10.1, which should correspond to R1 and R2 respectively. The correct
configurations to resolve this issue would be to ensure that both routers are configured with the same password
for MD5 authentication within the same peer group CORP.
Option A is correct because it configures R1 with the CORP peer group and sets the password to "Cisco" for
MD5 authentication.
Option E is correct because it configures R2 with a neighbor in the CORP peer group at IP address 10.10.10.1
(which should be R1) and sets the password to "Cisco" for MD5 authentication.
References := Implementing and Operating Cisco Service Provider Network Core Technologies
Refer to the exhibit. An engineer has configured an IP SLA for UDP echo's. Which command is needed to start
the IP SLA to test every 30 seconds and continue until stopped?
A. ip sla schedule 100 start-time now life forever
B. ip sla schedule 30 start-time now life forever
C. ip sla schedule 100 start-time now life 30
D. ip sla schedule 100 life forever
Answer: (SHOW ANSWER)
The command ip sla schedule 100 start-time now life forever is used to start the IP SLA operation immediately
(start-time now) and to continue it indefinitely (life forever). The 100 corresponds to the IP SLA operation
number, which must match the one specified in the IP SLA configuration. This command ensures that the IP
SLA operation for UDP echo tests will run every 30 seconds, as set by the frequency 30 command in the IP
SLA configuration, and will not stop unless manually terminated.
A. IPsec
B. TrustSec
C. MACseC
D. GRE
Answer: (SHOW ANSWER)
MACsec (Media Access Control Security) is the IEEE 802.1AE standard for securing data on Ethernet
networks. It provides end-to-end encryption at the data link layer (Layer 2), ensuring that data is secure as it
travels across the physical network infrastructure between two sites. MACsec encrypts each frame with a
secure key, providing confidentiality, integrity, and origin authenticity. Unlike IPsec, which operates at the
network layer (Layer 3), MACsec operates at a lower level, allowing for line-rate encryption that doesn't impact
the throughput of the network. This makes MACsec an ideal solution for protecting sensitive data in motion
without sacrificing performance.
Refer to the exhibit. The connecting between SW1 and SW2 is not operational. Which two actions resolve the
issue? (Choose two)
A. configure switchport mode access on SW2
B. configure switchport nonegotiate on SW2
C. configure switchport mode trunk on SW2
D. configure switchport nonegotiate on SW1
E. configure switchport mode dynamic desirable on SW2
Answer: (SHOW ANSWER)
In the scenario provided, SW1 is configured with 'switchport mode dynamic auto' which means it is willing to
convert the link to a trunk link if the connecting switch is set to trunk or desirable mode. Since SW2 also
appears to be set to 'switchport mode dynamic auto', neither switch is initiating the trunking negotiation. To
resolve this issue:
* Option C: Configuring 'switchport mode trunk' on SW2 would manually set the port into permanent trunking
mode which would then negotiate with SW1 and form a trunk.
* Option D: Configuring 'switchport nonegotiate' on SW1 would disable Dynamic Trunking Protocol (DTP)
negotiation messages. This should be done if you are setting one side of the connection (SW2) to a static trunk
because DTP messages are unnecessary in this case.
A. Option A
B. Option B
C. Option C
D. Option D
E. Option E
Answer: (SHOW ANSWER)
RSPAN allows the monitoring of traffic from source ports and VLANs across multiple switches. To complete the
RSPAN configuration, the network administrator must ensure that the RSPAN VLAN is properly configured on
both switches and that the source and destination ports are specified correctly. Option C likely involves
specifying the RSPAN VLAN as the source, while Option D probably includes setting the correct destination
interface for the RSPAN session.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the
forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?
A. standby 2 priority
B. standby 2 preempt
C. standby 2 track
D. standby 2 timers
Answer: (SHOW ANSWER)
In the context of HSRP, the standby 2 preempt command enables a router to become the active router when it
has a higher priority than the current active router. If Router 1 is set with a priority of 110 and it fails, causing
Router 2 to take over as the active router, then when Router 1 comes back online, it will not automatically take
back the role of active router unless it is configured with the preempt command. The preempt command allows
Router 1 to reclaim its role as the primary HSRP router due to its higher priority. References: Implementing and
Operating Cisco Service Provider Network Core Technologies (SPCOR) training materials or official
certification guide.
Communication between London and New York is down Which to resolve this issue?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The issue with communication between London and New York could be due to a variety of factors such as
routing misconfigurations, hardware failures, or issues with the service provider infrastructure. Option C is the
correct answer because it addresses a common cause of communication failure in service provider networks,
which is often related to routing or network configuration issues. Implementing and Operating Cisco Service
Provider Network Core Technologies (SPCOR) provides extensive knowledge on configuring, verifying,
troubleshooting, and optimizing service provider IP network infrastructures. This includes understanding core
architecture, services, networking, automation, quality of services, security, and network assurance, all of which
are crucial for resolving such issues.
https://learningnetwork.cisco.com/s/question/0D53i00000Ksyty/tostastns-tottattnt
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The correct command set for configuring RSPAN to capture outgoing traffic from VLAN 3 on interface
GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface is found in option C. This option
includes the commands that specifically target traffic from VLAN 3 and ensure that only this traffic is captured
for analysis, as per the requirements of RSPAN configuration in Cisco Service Provider Network Core
Technologies. References := Cisco SPCOR
Refer to the exhibit. Which configuration set implements Control plane Policing for SSH and Telnet?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
Control plane policing (CoPP) is a feature that allows you to manage the traffic that is destined to the control
plane of a network device. In the context of Cisco Service Provider network core technologies, implementing
CoPP for SSH and Telnet involves creating a policy map that specifies the allowed rate of traffic and the actions
to take when traffic exceeds this rate. Option C correctly implements CoPP by specifying class maps for SSH
and Telnet, setting the police rate, and applying the policy map to the control plane.
NEW QUESTION: 340
A network engineer must permit administrators to automatically authenticate if there is no response from cither
of the AAA servers. Which configuration achieves these results?
A. aaa authentication login default group tacacs+ line
B. aaa authentication enable default group radius local
C. aaa authentication login default group radius none
D. aaa authentication login default group radius
Answer: (SHOW ANSWER)
Drag and drop the statements onto the blanks within the code to complete the script. Not all options are used.
Answer:
Explanation:
Text, letter Description automatically generated
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Refer to the exhibit. Cisco IOS routers R1 and R2 are interconnected using interface Gi0/0. Which configuration
allows R1 and R2 to form an OSPF neighborship on interface Gi0/0?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
In the given scenario, Cisco IOS routers R1 and R2 can form an OSPF neighborship on interface Gi0/0 by
ensuring that the interface is not set as passive and by configuring the OSPF network command on R1. In
Option C, R2 has been configured with "passive-interface Gi0/0" under the OSPF routing process, which
means OSPF neighbor relationships won't be formed on this interface. However, on R1, "no passive-interface
Gi0/0" is configured ensuring that OSPF hello packets are exchanged allowing for neighbor formation.
Additionally, the "network" command is used to enable OSPF on specified interfaces belonging to the
mentioned network.
Refer to the exhibit. A network engineer must configure a password expiry mechanism on the gateway router
for all local passwords to expire after 60 days. What is required to complete this task?
A. The password expiry mechanism is on the AAA server and must be configured there.
B. Add the aaa authentication enable default Administrators command.
C. Add the username admin privilege 15 common-criteria*policy Administrators password 0 Cisco13579!
command.
D. No further action Is required. The configuration is complete.
Answer: (SHOW ANSWER)
The password expiry mechanism is typically managed on the AAA (Authentication, Authorization, and
Accounting) server where policies regarding password expiration can be set. In a Cisco environment, this would
involve configuring the appropriate settings on the AAA server to ensure that passwords expire after the
specified period, in this case, 60 days. The router itself does not have a built-in mechanism to expire
passwords; it relies on the AAA server for this functionality. References: Implementing and Operating Cisco
Service Provider Network Core Technologies (SPCOR) training materials.
Perform this task to create a password security policy and to apply the policy to a specific user profile.
Device> enable
Device# configure terminal
Device(config)# aaa new-model
Device(config)# aaa common-criteria policy policy1
Device(config-cc-policy)# char-changes 4
Device(config-cc-policy)# max-length 20
Device(config-cc-policy)# min-length 6
Device(config-cc-policy)# numeric-count 2
Device(config-cc-policy)# special-case 2
Device(config-cc-policy)# exit
Device(config)# username user1 common-criteria-policy policy1 password password1 Device(config)# end
A.
B.
C.
D.
Answer: (SHOW ANSWER)
Answer:
Explanation:
Chart Description automatically generated
B.
C.
D.
Answer: (SHOW ANSWER)
To configure flexible NetFlow to export flow samples that have been idle for 20 seconds, the correct command
set is the one that includes the cache timeout inactive 20 command. This command specifies the inactive flow
timeout period, after which the flow sample will be exported to the flow collector. The command set in Option D
is the appropriate choice as it contains this specific command, ensuring that idle flows are exported in a timely
manner to prevent overloading the flow collector.
Explanation:
A picture containing diagram Description automatically generated
A. 00:05:0c:07:ac:30
B. 00:00:0c:07:ac:1e
C. 05:0c:5e:ac:07:30
D. 00:42:18:14:05:1e
Answer: (SHOW ANSWER)
The default virtual MAC address used by HSRP (Hot Standby Router Protocol) group 30 is
"00:00:0c:07:ac:1e". HSRP uses a well-known MAC address format which includes the HSRP group number in
hexadecimal. For group 30, the hexadecimal equivalent is "1e", hence the virtual MAC address ends with
"ac:1e". References: Cisco Community discussion on HSRP Virtual MAC Format.
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The configuration in the image establishes an EBGP neighborship between two directly connected neighbors
and exchanges the loopback network of the two routers through BGP. In this configuration, both routers R1 and
R2 are configured with router bgp followed by their respective AS numbers. The neighbor command is used to
establish a BGP session, with the remote-as option specifying the AS number of the neighboring router. The
update-source lo0 command ensures that BGP messages are exchanged using the IP address of Loopback0
interface, facilitating EBGP multihop if necessary. Finally, the network command advertises each router's
loopback network into BGP.
References := Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR v1.1)
- Module: Border Gateway Protocol
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Answer:
Explanation:
Diagram Description automatically generated
NEW QUESTION: 365
Refer to the exhibit.
All switches are configured with the default port priority value. Which two commands ensure that traffic from
PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)
A. DSW2(config-if)#spanning-tree port-priority 16
B. DSW2(config)#interface gi1/3
C. DSW1(config-if)#spanning-tree port-priority 0
D. DSW1(config) #interface gi1/3
E. DSW2(config-if)#spanning-tree port-priority 128
Answer: B,D (LEAVE A REPLY)
In a Spanning Tree Protocol (STP) environment, the port priority determines which port should be put in
forwarding state when there is a tie in the path cost to the root bridge. The default port priority value is 128, and
it can be adjusted to influence which port becomes the designated or root port. The lower the port priority value,
the more likely the port will be selected as the designated port.
In the scenario provided, all switches are configured with the default port priority value. To ensure that traffic
from PC1 is forwarded over the Gi1/3 trunk port between DWS1 and DSW2, we need to select the appropriate
interface on both switches. The commands B and D are correct because they select the interface Gi1/3 on
DSW2 and DSW1, respectively. Once the correct interface is selected, other spanning-tree related commands
can be applied to influence the STP process.
The other options, A, C, and E, involve changing the port priority value, which is not necessary if the default
values are already causing the desired behavior. Moreover, option C suggests setting the port priority to 0,
which is not a valid value as the lowest possible priority value is 1.
Which configuration must be applied for the TACACS+ server to grant access-level rights to remote users?
A. R1(config)# aaa authentication login enable
B. R1(config)# aaa authorization exec default local if-authenticated
C. R1(config)# aaa authorization exec default group tacacs+
D. R1(config)# aaa accounting commands 15 default start-stop group tacacs+
Answer: (SHOW ANSWER)
This command configures the router to use TACACS+ for AAA authorization, which is necessary for
determining if a user has the rights to execute specific commands. When a user attempts to execute a
command, the router consults the TACACS+ server to verify the user's permissions. If the server authorizes the
action, the command is executed; otherwise, it is denied.
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The configuration snippet shown is for HSRP (Hot Standby Router Protocol) on a Cisco router interface. It
indicates that preemption is enabled with a delay sync of 100 seconds. This means if R1 fails and then regains
operational status, it will wait for 100 seconds before attempting to become the active router again, allowing
time for routing protocols to converge. References := Cisco Implementing and Operating Cisco Service
Provider Network Core Technologies Course
Refer to the exhibit. Which set of commands on router r R1 Allow deterministic translation of private hosts PC1,
PC2, and PC3 to addresses in the public space?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The correct set of commands to allow deterministic translation of private hosts PC1, PC2, and PC3 to
addresses in the public space would involve setting up NAT (Network Address Translation) on router R1. The
commands should define the inside and outside interfaces for NAT, specify an access list that includes the
private IP addresses of PC1, PC2, and PC3, and then apply this access list with a NAT statement that maps
these addresses to a public address or pool of addresses. Option C is likely the correct answer because it
typically contains the necessary commands for such a configuration. References: Implementing and Operating
Cisco Service Provider Network Core Technologies (SPCOR) source book or study guide.
Answer:
Explanation:
A. json.repr(Devices)
B. json.dumps(Devices)
C. json.prints(Devices)
D. json.loads(Devices)
Answer: (SHOW ANSWER)
The json.dumps() method is used to convert a Python object into a JSON string. This method is particularly
useful when you need to export the contents of an object, like 'Devices', in JSON format which can be easily
shared or stored. It serializes the data in a format that ensures it's easily parsable by systems that support
JSON. References: Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
source book or official documentation would provide more details on JSON handling within Python scripts used
for network automation.
Refer to the exhibit. Which EEM script generates a critical-level syslog message and saves a copy of the
running configuration to the bootflash when an administrator saves the running configuration to the startup
configuration?
A. Option A
B. Option B
C. Option C
D. Option D
Answer: (SHOW ANSWER)
Option C is the correct answer because it directly copies the running configuration to bootflash with the
command "copy running-config bootflash:/current_config.txt" and generates a critical-level syslog message
stating "Configuration saved and copied to bootflash". The other options involve additional steps or commands
that are not necessary for achieving the desired outcome.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Answer:
Explanation:
A picture containing graphical user interface Description automatically generated
A. device management
B. administration
C. device inventory
D. monitoring
Answer: (SHOW ANSWER)
The vManage API provides a REST API interface for controlling, configuring, and monitoring Cisco devices in
an overlay network. To obtain a list of fabric nodes, the device inventory collection is used, as it contains the
resources necessary to retrieve information about the devices managed by vManage
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Explanation:
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The correct configuration for establishing an eBGP neighborship and advertising a network involves specifying
the local AS number, the neighbor's IP address along with its AS number, and the network to be advertised with
the correct subnet mask. Option C correctly configures Router A with its local AS number (65001), sets up
Router B as a neighbor with its IP address (10.0.1.2) and remote AS number (65002), and advertises the
connected network on interface G0/1 (10.0.1.0) with the appropriate subnet mask (255.255.255.0). This
ensures that Router A will form an eBGP neighborship with Router B and advertise the connected network to it.
References: = Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR)
training materials or official certification guide.
Explanation:
Which two commands ensure that DSW1 becomes root bridge for VLAN 10 and 20?
A. spanning-tree mst 1 priority 1
B. spanning-tree mst 1 root primary
C. spanning-tree mstp vlan 10,20 root primary
D. spanning-tree mst vlan 10,20 priority root
E. spanning-tree mst 1 priority 4096
Answer: B (LEAVE A REPLY)
To ensure DSW1 becomes the root bridge for VLAN 10 and 20, the command spanning-tree mst 1 root primary
is used. This command sets the switch's priority to be the lowest in the network, making it the root bridge for the
specified MST instance.
A. ETR
B. MR
C. ITR
D. MS
Answer: (SHOW ANSWER)
The ETR, or Egress Tunnel Router, in LISP (Locator/ID Separation Protocol) is responsible for publishing EID-
to-RLOC (Endpoint Identifiers to Routing Locators) mappings for a site. This is part of the LISP control plane,
which separates the endpoint identity namespace (EID) from the routing locator namespace (RLOC), with the
ETR functioning as the component that advertises these mappings to the rest of the network, allowing for
proper routing and forwarding of packets to their intended destinations.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Answer:
Explanation:
A. underlay network
B. VPN routing/forwarding
C. easy virtual network
D. overlay network
Answer: (SHOW ANSWER)
In the Cisco SD-Access architecture, the overlay network is utilized to provide Layer 2 and Layer 3 logical
networks. This overlay is built on top of the physical network (underlay) and allows for the creation of virtual
networks that are decoupled from the physical infrastructure, enabling greater flexibility and scalability1.
References := Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) v1.0
training material
Which statement is needed to complete the EEM applet and use the Tel script to store the backup file?
A. action 2.0 cli command "write_backup.tcl tcl"
B. action 2.0 cli command "flash:write_backup.tcl"
C. action 2.0 cli command "write_backup.tcl"
D. action 2.0 cli command "telsh flash:write_backup.tcl"
Answer: (SHOW ANSWER)
The EEM applet automates tasks on Cisco devices. Here, the task is to create a backup file using a Tel script.
The correct CLI command to execute the Tel script from flash memory and complete the EEM applet is
"flash:write_backup.tcl".
Refer to the exhibit. An engineer must allow the FTP traffic from users on 172.16.1.0 /24 to 172.16.2.0 /24 and
block all other traffic. Which configuration must be applied?
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The configuration in Option A is the correct choice because it allows FTP traffic from the 172.16.1.0 /24 subnet
to the 172.16.2.0 /24 subnet, which is the requirement stated in the question. This is typically achieved by
creating an access control list (ACL) that permits traffic on port 21 (the standard port for FTP) from the source
subnet to the destination subnet and denies all other traffic.
A.
B.
C.
D.
Answer: (SHOW ANSWER)
The correct Python snippet to store the devices data structure in a JSON file is option C. This option uses the
json.dump() method, which serializes devices (the data structure) into a JSON formatted stream to OutFile
(which is the opened file for writing). The 'w' argument in open() function stands for write mode, which allows
you to write to the file.
An engineer must create a configuration that executes the show run command and then terminates the session
when user CCNP legs in. Which configuration change is required?
A. Add the access-class keyword to the username command
B. Add the access-class keyword to the aaa authentication command
C. Add the autocommand keyword to the username command
D. Add the autocommand keyword to the aaa authentication command
Answer: (SHOW ANSWER)
The scenario requires that when the user 'CCNP' logs in, the 'show run' command is executed, and then the
session is terminated immediately. This can be achieved by using the 'autocommand' keyword in the username
command. The 'autocommand' keyword allows a specific command to be automatically executed after a user
logs in. In this case, adding 'autocommand show run' to the 'username CCNP' command will execute the 'show
run' command upon login and then log out the user.
References:
* Implementing and Operating Cisco Service Provider Network Core Technologies (SPCOR) course material.
* Cisco documentation on AAA (Authentication, Authorization, and Accounting) configuration.
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)
Valid 350-401 Dumps shared by ExamDiscuss.com for Helping Passing 350-401 Exam! ExamDiscuss.com
now offer the newest 350-401 exam dumps, the ExamDiscuss.com 350-401 exam questions have been
updated and answers have been corrected get the newest ExamDiscuss.com 350-401 dumps with Test
Engine here: https://www.examdiscuss.com/Cisco/exam/350-401/premium/ (1282 Q&As Dumps, 35%OFF
Special Discount Code: freecram)