2023 Latest Braindump2go 350-401 PDF Dumps(Q517-Q550)


A network engineer must configure a router to send logging messages to a syslog server based on these requirements:

uses syslog IP address:

uses a reliable protocol

must not use any well-known TCP/UDP ports

Which configuration must be used?

A.logging host transport tcp port 1024

B.logging origin-id

C.logging host transport udp port 1023

D.logging host transport udp port 1024

Answer: A


Refer to the exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration?

A.Device(config)# netconf max-sessions 100

B.Device(config)# no netconf ssh acl 1

C.Device(config)# netconf lock-time 500

D.Device(config)# netconf max-message 1000

Answer: D


An engineer is configuring a new SSID to present users with a splash page for authentication.

Which WLAN Layer 3 setting must be configured to provide this functionally?


B.WPA2 Policy

C.Local Policy

D.Web Policy

Answer: D


An engineer must create an EEM script to enable OSPF debugging in the event the OSPF neighborship goes down.

Which script must the engineer apply?

A.Option A

B.Option B

C.Option C

D.Option D

Answer: C


Refer to the exhibit. Router BRDR-1 is configured to receive the and networks via BGP and advertise them into OSPF area 0. An engineer has noticed that the OSPF domain is receiving only the route and default route is still missing. Which configuration must an engineer apply to resolve the problem?

A.router ospf 1 redistribute bgp 65001 metric 100 route-policy BGP-TO-OSPF end

B.router ospf 1 default-information originate end

C.router ospf 1 default-metric 100 end

D.router ospf 1 default-information originate always end

Answer: D


AN engineer is implementing a route map to support redistribution within BGP. The route map must configured to permit all unmatched routes. Which action must the engineer perform to complete this task?

A.Include a permit statement as the first entry

B.Include at least one explicit deny statement

C.Remove the implicit deny entry

D.Include a permit statement as the last entry

Answer: D


Refer to the exhibit. A network operator is attempting to configure an IS-IS adjacency between two routers, but the adjacency cannot be established. To troubleshoot the problem, the operator collects this debugging output. Which interfaces are misconfigured on these routers?

A.The peer router interface is configured as Level 1 only, and the R2 interface is configured as Level 2 only

B.The R2 interface is configured as Level 1 only, and the Peer router interface is configured as Level 2 only

C.The R2 interface is configured as point-to-point, and the peer router interface is configured as multipoint.

D.The peer router interface is configured as point-as-point, and the R2 interface is configured as multipoint.

Answer: B


AN engineer is implementing MPLS OAM to monitor traffic within the MPLS domain. Which action must the engineer perform to prevent from being forwarded beyond the service provider domain when the LSP is down?

A.Disable IP redirects only on outbound interfaces

B.Implement the destination address for the LSP echo request packet in the 127.x.y.z/8 network

C.Disable IP redirects on all ingress interfaces

D.Configure a private IP address as the destination address of the headend router of Cisco MPLS TE.

Answer: B


An engineer is implementing a Cisco MPLS TE tunnel to improve the streaming experience for the clients of a video-on-demand server.

Which action must the engineer perform to configure extended discovery to support the MPLS LDP session between the headend and tailend routers?

A.Configure the interface bandwidth to handle TCP and UDP traffic between the LDP peers

B.Configure a Cisco MPLS TE tunnel on both ends of the session

C.Configure an access list on the interface to permit TCP and UDP traffic

D.Configure a targeted neighbor session.

Answer: B


What occurs when a high bandwidth multicast stream is sent over an MVPN using Cisco hardware?

A.The traffic uses the default MDT to transmit the data only if it isa (S,G) multicast route entry

B.A data MDT is created to if it is a (*, G) multicast route entries

C.A data and default MDT are created to flood the multicast stream out of all PIM-SM neighbors.

D.A data MDT is created to allow for the best transmission through the core for (S, G) multicast route entries.

Answer: D


Drag and Drop Question

An engineer is working with the Cisco DNA Center API Drag and drop the methods from the left onto the actions that they are used for on the right.



Drag and Drop Question

A network engineer is adding an additional 10Gps link to an exiting 2x10Gps LACP-based LAG to augment its capacity. Network standards require a bundle interface to be taken out of service if one of its member links goes down, and the new link must be added with minimal impact to the production network. Drag and drop the tasks that the engineer must perform from the left into the sequence on the right. Not all options are used.



Which protocol is used to encrypt control plane traffic between SD-WAN controllers and SD-WAN endpoints?





Answer: A


An engineer must configure the strongest password authentication to locally authenticate on a router. Which configuration must be used?

A.username netadmin secret 5 $1$b1JUSkZbBS1Pyh4OzwXyZ1kSZ2

B.username netadmin secret $15b1JuSk404850110QzwXyZ1k SZ2

C.line Console 0

password $15b1Ju$

D.username netadmin secret 9 $9$vFpMfBelbRVV8SseX/bDAxtuV

Answer: D


Which network devices secure API platform?

A.next-generation intrusion detection systems

B.Layer 3 transit network devices

C.content switches

D.web application firewalls

Answer: A


Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?

A.intrusion prevention

B.stateful inspection


D.SSL decryption

Answer: A


Refer to the exhibit. A company requires that all wireless users authenticate using dynamic key generation.

Which configuration must be applied?

A.AP(config-if-ssid)# authentication open wep wep_methods

B.AP(config-if-ssid)# authentication dynamic wep wep_methods

C.AP(config-if-ssid)# authentication dynamic open wep_dynamic

D.AP(config-if-ssid)# authentication open eap eap_methods

Answer: D


An engineer is configuring a GRE tunnel interface in the default mode. The engineer has assigned an IPv4 address on the tunnel and sourced the tunnel from an Ethernet interface.

Which option also is required on the tunnel interface before it is operational?

A.(config-if)#tunnel destination <ip address>

B.(config-if)#keepalive <seconds retries>

C.(config-if)#ip mtu <value>

D.(config-if)#ip tcp adjust-mss <value>

Answer: A


What Is a Type 2 hypervisor?

A.installed as an application on an already installed operating system

B.runs directly on a physical server and includes its own operating system

C.supports over-allocation of physical resources

D.also referred to as a "bare metal hypervisor" because it sits directly on the physical server

Answer: A


Which two statements about static route configuration are true? (Choose two)

A.They add to the number of routes in the routing table.

B.The distance command modifies the administrative distance

C.The redistribute static command will redistribute classful networks into OSPF.

D.They add significant overhead to the router CPU.

E.The ip route static bfd command is used for BFD peer discovery.

F.The permanent key word allows the route to remain in the route table if the interface goes down.

Answer: CF


What is a characteristic of Cisco DNA Northbound APIs?

A.They simplify the management of network infrastructure devices.

B.They enable automation of network infrastructure based on intent.

C.They utilize RESTCONF.

D.They utilize multivendor support APIs.

Answer: B


Which two items are found in YANG data models? (Choose two.)

A.HTTP return codes

B.rpc statements

C.JSON schema

D.container statements

E.XML schema

Answer: BE


What is required for a virtual machine to run?

A.a Type 1 hypervisor and a host operating system

B.a hypervisor and physical server hardware

C.only a Type 1 hypervisor

D.only a Type 2 hypervisor

Answer: B


An engineer configures GigabitEthernet 0/1 for VRRP group 115. The router must assume the primary role when it has the highest priority in the group.

Which command set is required to complete this task?

interface GigabitEthernet0/1

ip address

vrrp 115 ip

vrrp 115 authentication 407441579

A.Router(config if)# vrrp 115 track 1 decrement 100

Router(config-if)# vrrp 115 preempt

B.Router(config-if)# vrrp 115 track 1 decrement 10

Router(config-if)# vrrp 115 preempt

C.Router(config-if)# standby 115 priority 100

Router(config-if)# standby 115 preempt

D.Router(config-if)# vrrp 115 priority 100

Answer: B


An engineer must configure AAA on a Cisco 9800 WLC for central web authentication.

Which two commands are needed to accomplish this task? (Choose two.)

A.(Cisco Controller) > config wlan aaa-override disable <wlan-id>

B.(Cisco Controller) > config radius acct add 1812 SECRET

C.(Cisco Controller) > config wlan aaa-override enable <wlan-id>

D.Device(config-locsvr-da-radius)# client server-key 0 SECRET

E.Device(config)# aaa server radius dynamic-author

Answer: DE


What is a benefit of Type 1 hypervisors?

A.Administrators are able to load portable virtual machine packages in OVA or QCOW2 formats.

B.Network engineers are able to create virtual networks o interconnect virtual machines in Layer 2 topologies

C.Operators are able to leverage orchestrators to manage workloads that run on multiple Type 1 hypervisors

D.Storage engineers are able to leverage VMDK files to provide storage to virtual machine.

Answer: B


Refer to the exhibit. An engineer is troubleshooting an application running on Apple phones. The application Is receiving incorrect QoS markings. The systems administrator confirmed that ail configuration profiles are correct on the Apple devices.

Which change on the WLC optimizes QoS for these devices?

A.Enable Fastlane

B.Set WMM to required

C.Change the QoS level to Platinum

D.Configure AVC Profiles

Answer: A


A client device roams between wireless LAN controllers that are mobility peers, Both controllers have dynamic interface on the same client VLAN which type of roam is described?





Answer: B


Refer to the exhibit. Which result does the python code achieve?

A.The code encrypts a base64 decrypted password.

B.The code converts time to the "year/month/day" time format.

C.The code converts time to the yyyymmdd representation.

D.The code converts time to the Epoch LINUX time format.

Answer: C


Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?

A.threat defense

B.security services

C.security intelligence


Answer: A


Drag and Drop Question

Drag and drop the characteristics from the left onto the deployment models on the right.



Which two new security capabilities are introduced by using a next-generation firewall at the Internet edge? (Choose two.)


B.integrated intrusion prevention

C.application-level inspection


E.stateful packet inspection

Answer: BC


Drag and Drop Question

Drag and drop the characteristics from the left to the deployment models on the right. Not all options are used.



Refer to the exhibit. A network engineer attempts to connect to the Router1 console port.

Which configuration is needed to allow Telnet connections?

A.Router1(config)# line vty 0 15

Router1(config-line)# transport output telnet

B.Router1(config)# telnet client

C.Router1(config)# line console 0

Router1(config-line)# transport output telnet

D.Router1(config)# access-list 100 permit tcp any any eq telnet

Router1(config)# line console 0

Router1(config-line)# access-class 100 out

Answer: C

2023 Latest Braindump2go 350-401 PDF and 350-401 VCE Dumps Free Share:


4.7 Star App Store Review!
The Communities are great you rarely see anyone get in to an argument :)
Love Love LOVE

Select Collections