350-401 Dumps

350-401 Free Practice Test

Cisco 350-401: Implementing and Operating Cisco Enterprise Network Core Technologies

QUESTION 6

- (Topic 4)
In a wireless network environment, what is calculated using the numerical values of the transmitter power level, cable loss, and antenna gain?

Correct Answer: B

QUESTION 7

- (Topic 2)
In a Cisco SD-WAN solution, which two functions are performed by OMP? (Choose two.)

Correct Answer: AB
OMP is the control protocol that is used to exchange routing, policy, and management information between Cisco vSmart Controllers and Cisco IOS XE SD-WAN devices in the overlay network. These devices automatically initiate OMP peering sessions between themselves, and the two IP end points of the OMP session are the system IP addresses of the two devices.

QUESTION 8

- (Topic 3)
A network engineer is configuring OSPF on a router. The engineer wants to prevent having a route to 177.16.0.0/16 learned via OSPF. In the routing table and configures a prefix list using the command ip prefix-list OFFICE seq S deny 172.16.0.0/16. Winch two identical configuration commands must be applied to accomplish the goal? (Choose two.)

Correct Answer: AB

QUESTION 9

- (Topic 1)
Which configuration restricts the amount of SSH that a router accepts 100 kbps?
A)
350-401 dumps exhibit
B)
350-401 dumps exhibit
C)
350-401 dumps exhibit
D)
350-401 dumps exhibit

Correct Answer: C
CoPP protects the route processor on network devices by treating route processor
resources as a separate entity with its own ingress interface (and in some implementations, egress also). CoPP is used to police traffic that is destined to the route processor of the router such as:
+ routing protocols like OSPF, EIGRP, or BGP.
+ Gateway redundancy protocols like HSRP, VRRP, or GLBP.
+ Network management protocols like telnet, SSH, SNMP, or RADIUS.
350-401 dumps exhibit
Therefore we must apply the CoPP to deal with SSH because it is in the management plane. CoPP must be put under “control-plane” command.

QUESTION 10

- (Topic 2)
How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?

Correct Answer: B