Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Enterprise 350-401 Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

What is a characteristic of a Type 2 hypervisor?

Options:

A.

quick deployment


B.

ideal for data center


C.

complicated deployment


D.

referred to as bare-metal


Expert Solution
Questions # 42:

Which AP mode allows administrators to generate pcap files to use for troubleshooting?

Options:

A.

Sniffer


B.

Local


C.

H-REAP


D.

Monitor


Expert Solution
Questions # 43:

Which unit measures the power of a radio signal with reference to 1 milliwatt?

Options:

A.

dBi


B.

mW


C.

dBw


D.

dBm


Expert Solution
Questions # 44:

Which AP mode allows a supported AP to function like a WLAN client would, associating and identifying client connectivity issues?

Options:

A.

SE-connect mode


B.

sensor mode


C.

client mode


D.

sniffer mode


Expert Solution
Questions # 45:

What is the data policy in a Cisco SD-WAN deployment?

Options:

A.

list of ordered statements that define node configurations and authentication used within the SD-WAN overlay


B.

set of statements that defines how data is forwarded based on IP pocket information and specific VPNs


C.

detailed database mapping several kinds of addresses with their corresponding location


D.

group of services tested to guarantee devices and links liveliness within the SD-WAN overlay


Expert Solution
Questions # 46:

Drag and drop the Cisco Catalyst Center (formerly DNA Center) southbound API characteristics from the left to the right. Not all options are used.

Question # 46


Expert Solution
Questions # 47:

Which technique is used to protect end user devices and data from unknown file behavior?

Options:

A.

crypto file ransomware protection using a file hash calculation


B.

file retrospection using continuous scan and analyses


C.

phishing file quarantine using an internal environment to store attached files


D.

file sandboxing using a protected environment to analyze and simulate the behavior of unknown files


Expert Solution
Questions # 48:

What is a client who is using 802.1x for authentication referred to as?

Options:

A.

authenticator


B.

policy enforcement point


C.

NAC device


D.

supplicant


Expert Solution
Questions # 49:

Which two actions are recommended as security best practices to protect REST API? (Choose two.)

Options:

A.

Use SSL for encryption.


B.

Enable out-of-band authentication.


C.

Enable dual authentication of the session.


D.

Use TACACS+ authentication.


E.

Use a password hash.


Expert Solution
Questions # 50:

Question # 50

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.

Options:

A.

action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"


B.

action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"


C.

action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"


D.

action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions