This page was exported from Free Exam Dumps Collection [ http://free.examcollectionpass.com ] Export date:Wed Oct 23 13:31:59 2024 / +0000 GMT ___________________________________________________ Title: [Q225-Q242] Pass Your 350-401 Exam Easily With 100% Exam Passing Guarantee [2022] --------------------------------------------------- Pass Your 350-401 Exam Easily With 100% Exam Passing Guarantee [2022] 350-401 Dumps are Available for Instant Access from ExamcollectionPass NO.225 What is a benefit of a virtual machine when compared with a physical server?  Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.  Virtual machines increase server processing performance.  The CPU and RAM resources on a virtual machine cannot be affected by other virtual machines.  Deploying a virtual machine is technically less complex than deploying a physical server. NO.226 An engineer must protect their company against ransom ware attacks. Which solution allows the engineer to block the execution stage and prevent file encryption?  Use Cisco AMP deployment with the Malicious Activity Protection engineer enabled.  Use Cisco AMP deployment with the Exploit Prevention engine enabled.  Use Cisco Firepower and block traffic to TOR networks.  Use Cisco Firepower with Intrusion Policy and snort rules blocking SMB exploitation. Ransomware are malicious software that locks up critical resources of the users.Ransomware uses well-established public/private key cryptography which leavesthe only way of recovering the files being the payment of the ransom, or restoringfiles from backups.Cisco Advanced Malware Protection (AMP) for Endpoints Malicious ActivityProtection (MAP) engine defends your endpoints by monitoring the system andidentifying processes that exhibit malicious activities when they execute and stopsthem from running. Because the MAP engine detects threats by observing thebehavior of the process at run time, it can generically determine if a system isunder attack by a new variant of ransomware or malware that may have eludedother security products and detection technology, such as legacy signature-basedmalware detection. The first release of the MAP engine targets identification,blocking, and quarantine of ransomware attacks on the endpoint.Reference:endpoints/white-paper-c11-740980.pdfNO.227 Which two GRE features are configured to prevent fragmentation? (Choose two.)  TCP MSS  PMTUD  DF bit Clear  MTU ignore  IP MTU  TCP window size ExplanationThe IP protocol was designed for use on a wide variety of transmission links. Although the maximum length of an IP datagram is 65535, most transmission links enforce a smaller maximum packet length limit, called an MTU. The value of the MTU depends on the type of the transmission link. The design of IP accommodates MTU differences since it allows routers to fragment IP datagrams as necessary. The receiving station is responsible for the reassembly of the fragments back into the original full size IP datagram.Fragmentation and Path Maximum Transmission Unit Discovery (PMTUD) is a standardized technique to determine the maximum transmission unit (MTU) size on the network path between two hosts, usually with the goal of avoiding IP fragmentation. PMTUD was originally intended for routers in IPv4. However, all modern operating systems use it on endpoints.The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single TCP/IP datagram. This TCP/IP datagram might be fragmented at the IP layer. The MSS value is sent as a TCP header option only in TCP SYN segments. Each side of a TCP connection reports its MSS value to the other side. Contrary to popular belief, the MSS value is not negotiated between hosts. The sending host is required to limit the size of data in a single TCP segment to a value less than or equal to the MSS reported by the receiving host.TCP MSS takes care of fragmentation at the two endpoints of a TCP connection, but it does not handle the case where there is a smaller MTU link in the middle between these two endpoints.PMTUD was developed in order to avoid fragmentation in the path between the endpoints. It is used to dynamically determine the lowest MTU along the path from a packet’s source to its destination.NO.228 What is the result of applying this access control list?  TCP traffic with the URG bit set is allowed  TCP traffic with the SYN bit set is allowed  TCP traffic with the ACK bit set is allowed  TCP traffic with the DF bit set is allowed NO.229 Which function does a fabric edge node perform in an SD-Access deployment?  Connects the SD-Access fabric to another fabric or external Layer 3 networks  Connects endpoints to the fabric and forwards their traffic  Provides reachability border nodes in the fabric underlay  Encapsulates end-user data traffic into LISP. ExplanationThere are five basic device roles in the fabric overlay:+ Control plane node: This node contains the settings, protocols, and mapping tables to provide the endpoint-to-location (EID-to-RLOC) mapping system for the fabric overlay.+ Fabric border node: This fabric device (for example, core layer device) connects external Layer3 networks to the SDA fabric.+ Fabric edge node: This fabric device (for example, access or distribution layer device) connects wired endpoints to the SDA fabric.+ Fabric WLAN controller (WLC): This fabric device connects APs and wireless endpoints to the SDA fabric.+ Intermediate nodes: These are intermediate routers or extended switches that do not provide any sort of SD-Access fabric role other than underlay services.NO.230 What is the difference between the enable password and the enable secret password when service password encryption is enabled on an IOS device?  The enable secret password is protected via stronger cryptography mechanisms.  The enable password cannot be decrypted.  The enable password is encrypted with a stronger encryption method.  There is no difference and both passwords are encrypted identically. NO.231 Refer to the exhibit.A port channel is configured between SW2 and SW3. SW2 is not running a Cisco operating system. When all physical connections are mode, the port channel does not establish. Based on the configuration excerpt of SW3, what is the cause of the problem?  The port channel on SW2 is using an incompatible protocol.  The port-channel trunk is not allowing the native VLAN.  The port-channel should be set to auto.  The port-channel interface lead balance should be set to src-mac ExplanationThe Cisco switch was configured with PAgP, which is a Cisco proprietary protocol so non-Cisco switch could not communicate.NO.232 Drag and drop the characteristics from the left onto the correct infrastructure deployment types on the right. ExplanationCloud6,2,5 : On Premises4,3,1NO.233 Refer to the exhibit. PC-1 must access the web server on port 8080. To allow this traffic, which statement must be added to an access control list that is applied on SW2 port G0/0 in the inbound direction?  permit host 172.16.0.2 host 192.168.0.5 eq 8080  permit host 192.168.0.5 host 172.16.0.2 eq 8080  permit host 192.168.0.5 eq 8080 host 172.16.0.2  permit host 192.168.0.5 it 8080 host 172.16.0.2 NO.234 Based on the router’s API output in JSON format below, which Python code will display the value of the“hostname” key?A)B)C)D)  Option  Option  Option  Option NO.235 Drag and drop the solutions that comprise Cisco Cyber Threat Defense from the left onto the objectives they accomplish on the right. ExplanationNO.236 An engineer must export the contents of the devices object in JSON format. Which statement must be used?  json.repr(Devices)  json.dumps(Devices)  json.prints(Devices)  json.loads(Devices) NO.237 Refer to the exhibit. Both controllers are in the same mobility group. Which result occurs when client 1 roams between APs that are registered to different controllers in the same WLAN?  Client 1 contact controller B by using an EoIP tunnel.  CAPWAP tunnel is created between controller A and controller B.  Client 1 users an EoIP tunnel to contact controller A.  The client database entry moves from controller A to controller B. NO.238 Refer to the exhibit.All switches are configured with the default port priority value. Which two commands ensure that traffic from PC1 is forwarded over Gi1/3 trunk port between DWS1 and DSW2? (Choose two)  DSW2(config-if)#spanning-tree port-priority 16  DSW2(config)#interface gi1/3  DSW1(config-if)#spanning-tree port-priority 0  DSW1(config)#interface gi1/3  DSW2(config-if)#spanning-tree port-priority 128 NO.239 Which QoS mechanism will prevent a decrease in TCP performance?  Shaper  Rate-Limit  Policer  Fair-Queue  WRED  LLQ ExplanationWeighted Random Early Detection (WRED) is just a congestion avoidance mechanism. WREDdrops packets selectively based on IP precedence. Edge routers assign IP precedences to packetsas they enter the network. When a packet arrives, the following events occur:The average queue size is calculated.2. If the average is less than the minimum queue threshold, the arriving packet is queued.3. If the average is between the minimum queue threshold for that type of traffic and themaximum threshold for the interface, the packet is either dropped or queued, depending on thepacket drop probability for that type of traffic.4. If the average queue size is greater than the maximum threshold, the packet is dropped.WRED reduces the chances of tail drop (when the queue is full, the packet is dropped) byselectively dropping packets when the output interface begins to show signs of congestion (thus itcan mitigate congestion by preventing the queue from filling up). By dropping some packets earlyrather than waiting until the queue is full, WRED avoids dropping large numbers of packets atonce and minimizes the chances of global synchronization. Thus, WRED allows the transmissionline to be used fully at all times.WRED generally drops packets selectively based on IP precedence. Packets with a higher IPprecedence are less likely to be dropped than packets with a lower precedence. Thus, the higherthe priority of a packet, the higher the probability that the packet will be delivered.Reference:mt/qos-conavd-15-mt-book/qos-conavd-cfg-wred.htmlWRED is only useful when the bulk of the traffic is TCP/IP traffic. With TCP, dropped packetsindicate congestion, so the packet source will reduce its transmission rate. With other protocols,packet sources may not respond or may resend dropped packets at the same rate. Thus, droppingpackets does not decrease congestion.16/qos-conavd-xe-16-book/qos-conavd-oview.htmlNote: Global synchronization occurs when multiple TCP hosts reduce their transmission rates inresponse to congestion. But when congestion is reduced, TCP hosts try to increase theirtransmission rates again simultaneously (known as slow-start algorithm), which causes anothercongestion. Global synchronization produces this graph:NO.240 Refer to the exhibit.What is the JSON syntax that is formed from the data?  Make”:’Gocar, “Model’: “Zoom”, “Features”: [“Power Windows”, “Manual Dnve”, “Auto AC”]}  ‘Make “: “Gocar1, “Model”: “Zoom”, “Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]  {“Make”: Gocar, “Model”: Zoom, “Features”: Power Windows, Manual Drive, Auto AC}  (“Make”:[ “Gocar”, “Model”: “Zoom”], Features”: [“Power Windows”, “Manual Drive”, “Auto AC”]} ExplanationJSON syntax structure: + uses curly braces {} to hold objects and square brackets [] to hold arrays + JSON data is written as key/value pairs + A key/value pair consists of a key (must be a string in double quotation marks “”), followed by a colon :, followed by a value. For example: “name”:”John” + Each key must be unique + Values must be of type string, number, object, array, boolean or null + Multiple key/value within an object are separated by commas , JSON can use arrays. Arrays are used to store multiple values in a single variable. For example:{“name”:”John”,“age”:30,“cars”:[ “Ford”, “BMW”, “Fiat”]}In the above example, “cars” is an array which contains three values “Ford”, “BMW” and “Fiat”.Note: Although our correct answer above does not have curly braces to hold objects but it is still the best choice here.NO.241 Drag and drop the characteristics from the left onto the technology types on the right. ExplanationOrchestrationOrchestration means arranging or coordinating multiple systems. It’s also used to mean “running the same tasks on a bunch of servers at once, but not necessarily all of them.” Configuration Management Config Management is part of provisioning. Basically, that’s using a tool like Chef, Puppet or Ansible to configure our server. “Provisioning” often implies it’s the first time we do it. Config management usually happens repeatedly.Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product’s performance, functional, and physical attributes with its requirements, design, and operational information throughout its life Configuration management is all about bringing consistency in the infrastructure.Configuration Orchestration vs Configuration ManagementThe first thing that should be clarified is the difference between “configuration orchestration” and“configuration management” tools, both of which are considered IaC tools and are included on this list.Configuration orchestration tools, which include Terraform and AWS CloudFormation, are designed to automate the deployment of servers and other infrastructure. Configuration management tools like Chef, Puppet, and the others on this list help configure the software and systems on this infrastructure that has already been provisioned.NO.242 Which statement about an RSPAN session configuration is true?  A fitter mutt be configured for RSPAN Regions  Only one session can be configured at a time  A special VLAN type must be used as the RSPAN destination.  Only incoming traffic can be monitored  Loading … Study resources for the Valid 350-401 Braindumps: https://www.examcollectionpass.com/Cisco/350-401-practice-exam-dumps.html --------------------------------------------------- Images: https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif https://free.examcollectionpass.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-04-19 05:18:07 Post date GMT: 2022-04-19 05:18:07 Post modified date: 2022-04-19 05:18:07 Post modified date GMT: 2022-04-19 05:18:07