This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Mon May 20 22:41:15 2024 / +0000 GMT ___________________________________________________ Title: [March-2021]100% Valid 350-401 PDF and VCE Exam Dumps 350-401 391 Provided by Braindump2go[Q367-Q391] --------------------------------------------------- March/2021 Latest Braindump2go 350-401 Exam Dumps with PDF and VCE Free Updated Today! Following are some new 350-401 Real Exam Questions!QUESTION 367Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)A. Utilize DHCP option 17.B. Configure WLC IP address on LAN switch.C. Utilize DHCP option 43.D. Configure an ip helper-address on the router interfaceE. Enable port security on the switch portAnswer: CDQUESTION 368Refer to the exhibit. Which JSON syntax is derived from this data? A. B. C. D. Answer: CQUESTION 369Which two network problems indicate a need to implement QoS in a campus network? (Choose two)A. port flappingB. excess jitterC. misrouted network packetsD. duplicate IP addressesE. bandwidth-related packet lossAnswer: BDQUESTION 370Which outcome is achieved with this Python code? A. connects to a Cisco device using SSH nd exports the routing table informationB. displays the output of the show command in a formatted wayC. connects to a Cisco device using SSH and exports the BGP table for the prefixD. connects to a Cisco device sing Telnet and exports the routing table informationAnswer: CQUESTION 371----QUESTION 3MISSING----- A. DSW2(config if)#spanning-tree port-priority 128B. DSW2(config-if)#spanning-tree port-priority 16C. DSW2( onfig-if)#interface gi1/3D. DSW1(config-if)#interface gi1/3E. DWS1(config-if)#spanning-tree port-priority 0Answer: DEQUESTION 372In a Cisco SD-Access solution, what is the role of the Identity Services Engine?A. It is leveraged for dynamic endpoint to group mapping and policy definition.B. It provides GUI management and abstraction via apps that share context.C. it is used to analyze endpoint to app flows and monitor fabric status.D. It manages the LISP EID database.Answer: CQUESTION 373What is the data policy in a Cisco SD-WAN deployment?A. list of ordered statements that define node configurations and authentication used within the SD-WAN overlayB. Set of statements that defines how data is forwarded based on IP packet information and specific VPNsC. detailed database mapping several kinds of addresses with their corresponding locationD. group of services tested to guarantee devices and links liveliness within the SD-WAN overlayAnswer: BQUESTION 374In a three-tier hierarchical campus network design, which action is a design best-practice for the core layer?A. provide QoS prioritization services such as marking, queueing, and cl ssification for critical network trafficB. provide redundant Layer 3 point-to-point links between the core devices for more predictable and faster convergenceC. provide advanced network security features such as 802. IX, DHCP snooping, VACLs, and port securityD. provide redundant aggregation for access layer devices and first-hop redundancy protocols such as VRRPAnswer: AQUESTION 375Refer to the exhibit. Which configuration change ensures that R1 is the active gateway whenever it is in a functional state for the 172.30.110.0724 network? A. B. C. D. Answer: DQUESTION 376What ate two characteristics of Cisco SD-Access elements? (Choose two )A. The border node is required for communication between fabric and nonfabric devices.B. Fabric endpoints are connected directly to the border nodeC. Traffic within the fabric always goes through the control plane nodeD. The control plane node has the full RLOC-to-EID mapping databaseE. The border node has the full RLOC-to-EID mapping databaseAnswer: ADQUESTION 377What is YANG used for?A. scraping data via CLIB. processing SNMP read-only pollsC. describing data modelsD. providing a transport for network configuration data between client and serverAnswer: CQUESTION 378Refer to the exhibit. Which action resolves the EtherChannel issue between SW2 and SW3? A. Configure switchport mode trunk on SW2.B. Configure switchport nonegotiate on SW3C. Configure channel-group 1 mode desirable on both interfaces.D. Configure channel-group 1 mode active on both interfaces.Answer: DQUESTION 379A customer has completed the installation of a Wi-Fi 6 greenfield deployment at their new campus. They want to leverage Wi-Fi 6 enhanced speeds on the trusted employee WLAN. To configure the employee WLAN, which two Layer 2 security policies should be used? (Choose two.)A. 802.1XB. WPA (AES)C. WPA2 (AES) jWEPD. OPENAnswer: ACQUESTION 380The following system log message is presented after a network administrator configures a GRE tunnel %TUN-RECURDOWN Interface Tunnel 0 temporarily disabled due to recursive routing. Why is Tunnel 0 disabled?A. Because dynamic routing is not enabledB. Because the tunnel cannot reach its tunnel destinationC. Because the best path to the tunnel destination is through the tunnel itselfD. Because the router cannot recursively identify its egress forwarding interface.Answer: CQUESTION 381Which encryption hashing algorithm does NTP use for authentication?A. SSLB. MD5C. AES128D. AES256Answer: BQUESTION 382Which data is properly formatted with JSON?A. B. C. D. Answer: CQUESTION 383Refer to the exhibit. An engineer must assign an IP address of 192.168.1.1/24 to the GigabitEthemet1 in erface.Which two commands must be added to the existing configuration to accomplish this task (Choose two) A. Router(config-vrf)# address-family ipv6B. Router(config-if)# ip address 192.168.1.1 255.255.255.0C. Router(config-vrf)# ip address 192.168.1.1 255.255.255.0D. Router(config-if)# address-family ipv4E. Router(config-vrf)# address-family ipv4Answer: BEQUESTION 384How does Protocol Independent Multicast function?A. In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals.B. It uses the multicast routing table to perform the multicast forwarding function.C. It uses unicast routing information to perform the multicast forwarding function.D. It uses broadcast routing information to perform the multicast forwarding function.Answer: CQUESTION 385Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic?A. bridge domainB. VLANC. VRFD. VNIAnswer: DQUESTION 386What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.)A. implementing static mroutesB. disabling BGP routing protocolC. implementing MBGPD. disabling the interface of the router back to the multicast sourceE. implementing OSPF routing protocolAnswer: ACExplanation:https://www.cisco.com/c/en/us/support/docs/ip/ip-multicast/16450-mcastguide0 htmlQUESTION 387Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial?A. under all network conditionsB. under network convergence conditionsC. under traffic classification and marking conditionsD. under interface saturation conditionsAnswer: CQUESTION 388What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution?A. real-time threat management to stop DDoS attacks to the core and access networksB. real-time awareness of users, devices and traffic on the networkC. malware controlD. dynamic threat control for web trafficAnswer: AQUESTION 389A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Clients connected to the corporate WLAN roam seamlessly between access points on the 5520 and 9800 WLC. After a failure on the primary 5520 WLC, all WLAN services remain functional; however clients cannot roam between the 5520 and 9800 controllers without dropping their connection.Which feature must be configured to remedy the issue?A. mobility MAC on the 5520 clusterB. mobility MAC on the 9800 WLCC. new mobility on the 5520 clusterD. new mobility on the 9800 WLCAnswer: BQUESTION 390Refer to the exhibit. Assuming all links are functional, which path does PC1 take to reach DSW1? A. PC1 goes from ALSW1 to DSW1B. PC1 goes form ALSW1 to DSW2 to ALSW2 to DSW1C. PC1 goes from ALSW1 to DSW2 to Core to DSW1D. PC1 goes from ALSW1 to DSW2 to DSW1Answer: DExplanation:In the topology above, we see DSW2 has lowest priority 24576 so it is the root bridge for VLAN 10 so surely all traffic for this VLAN must go through it. All of DSW2 ports must be in forwarding state. And:+ The direct link between DSW1 and ALSW1 is blocked by STP.+ The direct link between DSW1 and ALSW2 is also blocked by STP.Therefore PC1 must go via this path: PC1 -> ALSW1 -> DSW2 -> DSW1.QUESTION 391Drag and Drop QuestionAn engineer creates the configuration below. Drag and drop the authentication methods from the left into the order of priority on the right. Not all options are used. Answer: Resources From:1.2021 Latest Braindump2go 350-401 Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/350-401.html2.2021 Latest Braindump2go 350-401 PDF and 350-401 VCE Dumps Free Share:https://drive.google.com/drive/folders/1EIsykNTrKvqjDVs9JMySv052qbrCpe8V?usp=sharing3.2021 Free Braindump2go 350-401 Exam Questions Download:https://www.braindump2go.com/free-online-pdf/350-401-PDF-Dumps(367-391).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2021-03-17 01:30:37 Post date GMT: 2021-03-17 01:30:37 Post modified date: 2021-03-17 01:34:18 Post modified date GMT: 2021-03-17 01:34:18 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com