Win IT Exam with Last Dumps 2025


Cisco 350-401 Exam

Page 63/64
Viewing Questions 621 630 out of 638 Questions
98.44%

Question 621
Which of the following are true statements regarding the Virtual Router Redundancy Protocol (VRRP) feature? (Choose two.)
A. Pre-emption is enabled by default
B. The router priority is a configurable value from 0-4095
C. MD5 authentication is supported with VRRP
D. Secondary IP addresses are supported with VRRP
E. VRRP can only be used with Cisco devices

Question 622
You want to securely implement the Network Time Protocol (NTP) on your network. What two mechanisms are available to secure NTP? (Choose two.)
A. IPSec communication
B. MD5 authentication keys
C. Role based access control (RBAC)
D. access-group configuration

Question 623
Which Cisco EIGRP K-values are set to zero by default? (Choose three.)
A. Bandwidth
B. Load
C. Total Delay
D. Reliability
E. MTU

Question 624
What are the four stages of obtaining an IP address lease from a DHCP server?
A. Discover, Offer, Release, Renew
B. Discover, Obtain, Request, Renew
C. Determine, Obtain, Release, Acknowledge
D. Discover, Offer, Request, Acknowledge

Question 625
A new multicast server is being added to an existing PIM Sparse mode network
Which device in this network must the new server register with before its multicast traffic can be dispersed throughout the network?
A. IGMP Querier
B. Local PIM router
C. Local IGMP switch
D. Rendezvous Point (RP)


Question 626
You want to create a policy that allows all TCP traffic in the port range of 20 to 110, except for telnet traffic, which should be dropped
Which of the following access control lists will accomplish this?
A. deny tcp any any eq 22
permit tcp any any gt 20 lt 110
B. permit tcp any any range 22 443
deny tcp any any eq 23
C. deny tcp any any eq 23
permit tcp any any
D. deny tcp any any eq 23
permit tcp any any range 20 110

Question 627
Which of the following are features typically only found in a Next Generation (NextGen) firewall? (Choose two.)
A. Network Address Translation (NAT)
B. Secure remote access VPN (RA VPN)
C. Deep packet inspection
D. reputation based malware detection
E. IPSec site-to-site VPN

Question 628
JSON web tokens (JWT) are used to secure JSON based communications
Which of the following fields make up a JWT? (Choose three.)
A. Header
B. Trailer
C. Payload
D. Sequence number
E. Signature

Question 629
Ansible is being used in a network for configuration and management automation
Which of the following are true statements regarding Ansible? (Choose two.)
A. Requires an agent on the end device.
B. Utilizes the concept of playbooks to execute the configuration.
C. Uses a pull model, where the end devices pull configuration files from the Ansible server.
D. Utilizes SSH.

Question 630
In a Cisco VXLAN based network, which of the following best describes the main function of a VXLAN Tunnel Endpoint (VTEP)?
A. A device that performs VXLAN encapsulation and decapsulation.
B. It is a 24 bit segment ID that defines the broadcast domain.
C. It is the Logical interface where the encapsulation and de-encapsulation occurs.
D. It is a device that performs tunneling using GRE.