350-401 Real Exam Dumps Questions and answers 31-40

Get Full Version of the Exam

Question No.31

An engineer is configuring local web authentication on a WLAN. The engineer chooses the Authentication radio button under the Layer 3 Security options for Web Policy. Which device presents the web authentication for the WLAN?

  1. ISE server

  2. local WLC

  3. RADIUS server

  4. anchor WLC

Correct Answer: B

Question No.32

Which requirement for an Ansible-managed node is true?

  1. It must be a Linux server or a Cisco device.

  2. It must have an SSH server running.

  3. It must support ad hoc commands.

  4. It must have an Ansible Tower installed.

Correct Answer: A

Question No.33

Which JSON syntax is valid?


  1. Option A

  2. Option B

  3. Option C

  4. Option D

Correct Answer: B

Question No.34

Which statement describes the IP and MAC allocation requirements for virtual machines on types 1 hypervisors?

  1. Each virtual machine requires a unique IP and MAC addresses to be able to reach to other nodes.

  2. Each virtual machine requires a unique IP address but shares the MAC address with the physical


  3. Each virtual machines requires a unique IP address but shares the MAC address with the address of the physical server.

  4. Each virtual machine requires a unique MAC address but shares the IP address with the physical server.

Correct Answer: A

Question No.35


Refer to the exhibit. SwitchC connects HR and Sales to the Core switch However, business needs require that no traffic from the Finance VLAN traverse this switch Which command meets this requirement?






Correct Answer: D

Question No.36

What is a benefit of deploying an on-premises infrastructure versus a cloud infrastructure deployment?

  1. faster deployment times because additional infrastructure does not need to be purchased

  2. lower latency between systems that are physically located near each other

  3. less power and cooling resources needed to run infrastructure on-premises

  4. ability to quickly increase compute power without the need to install additional hardware

Correct Answer: B

Question No.37


Drag and drop the description from the left onto the correct QoS components on the right.


Correct Answer:


Question No.38

What is the correct EBGP path attribute list, ordered from most preferred to the least preferred, that the BGP best-path algorithm uses?

  1. weight. AS path, local preference. MED

  2. weight, local preference AS path, MED

  3. local preference weight AS path, MED

  4. local preference, weight MED, AS path

Correct Answer: B

Question No.39

Which two mechanisms are available to secure NTP? (Choose two.)

  1. IP prefix list-based

  2. IPsec

  3. TACACS-based authentication

  4. IP access list-based

  5. Encrypted authentication

Correct Answer: DE

Question No.40

What the role of a fusion in an SD-Access solution?

  1. provides connectivity to external networks

  2. acts as a DNS server

  3. performs route leaking between user-defined virtual networks and shared services

  4. provides additional forwarding capacity to the fabric

Correct Answer: C

Get Full Version of 350-401 Dumps