350-401 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/350-401.html

Question No.1

Which two GRE features are configured to prevent fragmentation? (Choose two.)

  1. TCP window size

  2. TCP MSS

  3. IP MTU

  4. DF bit clear

  5. MTU ignore

Correct Answer: BC

Question No.2

Refer to the exhibit. Which configuration establishes EBGP neighborship between these two directly connected neighbors and exchanges the loopback network of the two routers through BGP?

image

image

A.

B.

C.

image

D.

Correct Answer: A

Question No.3

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

  1. A.CISCO-DNA-CONTROLLER local

  2. CAPWAP-CONTROLLER local

  3. CISCO-CONTROLLER local

  4. CISCO-CAPWAP-CONTROLLER local

Correct Answer: D

Question No.4

Which statement about agent-based versus agentless configuration management tools is true?

  1. Agentless tools require no messaging systems between master and slaves.

  2. Agentless tools use proxy nodes to interface with slave nodes.

  3. Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave nodes.

  4. Agent-based tools do not require installation of additional software packages on the slave nodes.

Correct Answer: D

Question No.5

In which part of the HTTP message is the content type specified?

  1. HTTP method

  2. URI

  3. header

  4. body

Correct Answer: D

Question No.6

Which two methods are used by an AP that is typing to discover a wireless LAN controller? (Choose two.)

  1. Cisco Discovery Protocol neighbour

  2. broadcasting on the local subnet

  3. DNS lookup cisco-DNA-PRIMARY.localdomain

  4. DHCP Option 43

  5. querying other APs

Correct Answer: CD

Question No.7

Which two protocols are used with YANG data models? (Choose two.)

  1. HTTPS

  2. SSH

  3. RESTCONF

  4. TLS

  5. NFTCONF

Correct Answer: CE

Question No.8

Based on this interface configuration, what is the expected state of OSPF adjacency?

image

  1. Full on both routers

  2. not established

  3. 2WAY/DROTHER on both routers

  4. FULL/BDR on R1 and FULL/BDR on R2

Correct Answer: B

Question No.9

The login method is configured on the VTY lines of a router with these parameters.

image

The first method for authentication is TACACS

image

If TACACS is unavailable, login is allowed without any provided credentials Which configuration accomplishes this task?

image

  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: C

Question No.10

Which two operations are valid for RESTCONF? (Choose two.)

  1. HEAD

  2. REMOVE

  3. PULL

  4. PATCH

  5. ADD

  6. PUSH

Correct Answer: AD

Get Full Version of 350-401 Dumps