350-401 VOL2 Flashcards
Which of the following IP SLA functions do not require a responder to be configured?
D. ICMP Echo
A new syslog server with an IP address of 10.1.1.100 has been installed in the network. You want
router R1 to send secure, encrypted messages to this server to track network events. What
configuration command should you use?
A. R1(config)# logging host 10.1.1.100 vrf mgmt transport tcp port 6514
You want to create a policy that allows all TCP traffic in the port range of 20 to 110, except for
telnet traffic, which should be dropped. Which of the following access control lists will
accomplish this?
D. deny tcp any any eq 23
permit tcp any any range 20 110
In a Cisco SD-Access network architecture, what is the role of the Fabric Edge Node?
D. It connects wireless endpoints to the SDA fabric
Which of the following are features typically only found in a Next Generation (NextGen) firewall?
(Select two)
C. Deep packet inspection
D. reputation based malware detection
JSON web tokens (JWT) are used to secure JSON based communications. Which of the following
fields make up a JWT? (Select three)
A. Header
C. Payload
E. Signature
Ansible is being used in a network for configuration and management automation. Which of the
following are true statements regarding Ansible? (Choose two)
B. Utilizes the concept of playbooks to execute the configuration.
D. Utilizes SSH.
In a Cisco Software Defined Networking (SDN) architecture, what is used to describe the API
communication between the SDN controller and the network elements (routers and switches)
that it manages?
A. Southbound API
In a Cisco VXLAN based network, which of the following best describes the main function of a
VXLAN Tunnel Endpoint (VTEP)?
A. A device that performs VXLAN encapsulation and decapsulation.
Two Cisco switches are logically configured as a single switch using Cisco Stackwise technology.
This will result in virtually combining which two planes? (Select two)
B. Control Plane
D. Management Plane
Please select the correct option that shows the correct combination for the Type 1 Hypervisor.
A. Hardware; Hypervisor; Guest OS
Select the prerequisites for configuring LISP from the below options. (Choose 2)
A. determine the type of LISP deployment you intend to deploy
C. LISP configuration requires the datak9 license.
Select the benefits of implementing Cisco DNA Center. (Choose all that apply).
A. Simplified management
D. Policy Driven Provisioning
E. Ensure Network & Appliance performance
A network administrator need to configure Netflow on the devices in his network. He has Source
IP Address, Destination IP Address, Source Port number & Destination port number. What
additional information do he need to configure Netflow.
A. Layer 3 Protocol type
C. ToS (Type of Service) byte
D. Input Logical Interface
A network administrator is configuring a configuration management tool for some network
devices that does not support agent. Select what option will you pick from the below options to
successfully configure configuration management tool for that device.
C. Proxy-agent Configuration