Winter Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

350-401 Questions and Answers

Question # 6

Which lag/profile on a Cisco Catalyst 9800 Series WLC must be modified to allow Cisco ISE to dynamically assign VLANs to users on an 802.1X-based SSID?

A.

interface lag

B.

site tag

C.

WLAN profile

D.

policy profile

Full Access
Question # 7

Which two benefits result from a network design mat uses small and repeatable sections? (Choose two.)

A.

lower monitoring requirements

B.

low latency

C.

scalability

D.

quick failure isolation

E.

improved throughput

Full Access
Question # 8

Which technology collects location information through data packets received by the APs instead of using mobile device probes?

A.

detect and locate

B.

FastLocate

C.

hyperlocation

D.

RF fingerprinting

Full Access
Question # 9

Drag and drop the automation characteristics from the left to the corresponding tools on the right.

Full Access
Question # 10

Drag and drop the snippets onto the blanks within the code to create an EEM script that adds an entry to a locally stored text file with a timestamp when a configuration change is made. Not all options are used.

Full Access
Question # 11

Which component transports data plane traffic across a Cisco SD-WAN network?

A.

vSmart

B.

vManage

C.

cEdge

D.

vBond

Full Access
Question # 12

How does Cisco DNA Center perform a network discovery?

A.

using SNMP

B.

using ICMP

C.

through a DHCP server

D.

using CDP with a seed IP address

Full Access
Question # 13

Drag and drop the REST API authentication methods from the left onto their descriptions on the right.

Full Access
Question # 14

An engineer must create a new SSID on a Cisco 9800 wireless LAN controller. The client has asked to use a pre-shared key for authentication. Which profile must the engineer edit to achieve this requirement?

A.

RF

B.

WLAN

C.

Policy

D.

Flex

Full Access
Question # 15

Which method requires a client to authenticate and has the capability to function without encryption?

A.

open

B.

WEP

C.

WebAuth

D.

PSK

Full Access
Question # 16

With IGMPv2, which multicast group address does the IGMP querier use to send query messages to all hosts on the LAN?

A.

239.0.0.2

B.

224.0.0.1

C.

239.0.0.1

D.

224.0.0.2

Full Access
Question # 17

An engineer is reviewing a PCAP file that contains a packet capture of a four-way handshake exchange between a client and AP using WPA2 Enterprise Which EAPOL message validates and confirms that the client device has successfully Installed the GTK?

A.

M4-Message

B.

M3-Message

C.

M2-Message

D.

M1-Message

Full Access
Question # 18

Refer to the exhibit Which command set is required on router R1 to allow the network administrator to authenticate via RADIUS'?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 19

An engineer must configure a new 6 Ghz only SSID on a cisco catalyst 9800 series WLC, with these requirements:

    Provide 802.11ax data rates for supported devices

    All users authenticate using a certificate

Which wireless layer 2 security mode meets the requirements?

A.

WPA2 Enterprise

B.

WPA3 Personal

C.

WPA2 Personal

D.

WPA3 Enterprise

Full Access
Question # 20

What is a characteristics of Wi-Fi channels?

A.

The 2 4-GHz balWMS§24 non-overlapping channels

B.

Devices that connect to the same Wi-Fi channel reside in the same collision domain.

C.

Wi-Fi channels are spaced 30 MHz apart.

D.

The 5-GHz band offers 11 different channels for Wi-Fi clients

Full Access
Question # 21

What is a Type 1 hypervisor?

A.

runs directly on a physical server and depends on a previously installed operating system

B.

runs directly on a physical server and includes its own operating system

C.

runs on a virtual server and depends on an already installed operating system

D.

run on a virtual server and includes its own operating system.

Full Access
Question # 22

Refer to the exhibit. A POST /discovery request spawns an asynchronous task. After querying for more information about the task, the Cisco DNA Center platform returns the REST API response. What is the status of the discovery task?

A.

restarted

B.

failed

C.

stopped

D.

successful

Full Access
Question # 23

What is a characteristic of VXLAN?

A.

It extends Layers 2 and Layer 3 overlay network over a Layer 2 underly.

B.

It has a 12-byte packet header.

C.

Its frame encapsulation is performed by MAC-in-UDP.

D.

It uses TCP for transport

Full Access
Question # 24

How does NETCONF YANG represent data structures?

A.

as strict data structures defined by RFC 6020

B.

in an XML tree format

C.

In an HTML format

D.

as modules within a tree

Full Access
Question # 25

An engineer is implementing a new SSID on a Cisco Catalyst 9800 Series WLC that must be broadcast on 6 GHz radios. Users will be required to use EAP-TLS to authenticate. Which wireless Layer 2 security method is required?

A.

WPA3 Personal

B.

WPA3 Enterprise

C.

WPA3 Enterprise

D.

WPA2 Personal

Full Access
Question # 26

Refer to the exhibit.

What does the error message relay to the administrator who is trying to configure a Cisco IOS device?

A.

A NETCONF request was made for a data model that does not exist.

B.

The device received a valid NETCONF request and serviced it without error.

C.

A NETCONF message with valid content based on the YANG data models was made, but the request failed.

D.

The NETCONF running datastore is currently locked.

Full Access
Question # 27

Which IEEE standard provides the capability to permit or deny network connectivity based on the user or device identity?

A.

802. 1d

B.

802.1x

C.

802.1q

D.

802.1w

Full Access
Question # 28

Full Access
Question # 29

A customer wants to use a single SSID to authenticate loT devices using different passwords. Which Layer 2 security type must be configured in conjunction with Cisco ISE to achieve this requirement?

A.

Identity PSK

B.

Fast Transition

C.

Central Web Authentication

D.

Cisco Centralized Key Management

Full Access
Question # 30

Full Access
Question # 31

Full Access
Question # 32

Full Access
Question # 33

Full Access
Question # 34

Full Access
Question # 35

Full Access
Question # 36

Full Access
Question # 37

Full Access
Question # 38

Full Access
Question # 39

Full Access
Question # 40

Full Access
Question # 41

Full Access
Question # 42

Full Access
Question # 43

Full Access
Question # 44

Full Access
Question # 45

Full Access
Question # 46

OR

Full Access
Question # 47

Full Access
Question # 48

Full Access
Question # 49

Full Access
Question # 50

Full Access
Question # 51

Full Access
Question # 52

Full Access
Question # 53

Full Access
Question # 54

Full Access
Question # 55

Full Access