350-401 Exam Questions

Total 253 Questions

Last Updated Exam : 16-Jul-2025

Topic 1: Exam Pool A


A. Option A


B. Option B


C. Option C


D. Option D





D.
  Option D


A. Option A


B. Option B


C. Option C


D. Option D





A.
  Option A

Which characteristic applies to Cisco SD-Access?


A. It uses dynamic routing the discover and provision access switches.


B. It uses VXLAN for the control plane


C. It uses VXLAN for the data plane


D. It uses dynamic routing to discover and provision border switches





B.
  It uses VXLAN for the control plane

Which two actions are recommended as security best practices to protect REST API? (Choose two.)


A. Use SSL for encryption.


B. Enable out-of-band authentication.


C. Enable dual authentication of the session.


D. Use TACACS+ authentication.


E. Use a password hash.





A.
  Use SSL for encryption.

C.
  Enable dual authentication of the session.

What is the purpose of data modeling languages?


A. to describe a data schema convertible into any data encoding format


B. to specify algorithms necessary to decode binary-encoded protocol data units


C. to translate encoded data for interoperability between different CPU architectures


D. to provide a framework to describe data flow patterns in networks





A.
  to describe a data schema convertible into any data encoding format

What is used by vManage to interact withCiscoSD-WAN devices in the fabric?


A. northbound API


B. RESTCONF


C. Southbound API


D. IPsec





C.
  Southbound API

Which device is responsible for finding EID-to-RLOC mappings when traffic is sent to a LISP-capable site?


A. ingress tunnel router


B. map resolver


C. egress tunnel router


D. map server





B.
  map resolver

Drag and drop the code snippets from the bottom onto the blanks in the script to convert a Python object into a JSON string. Not all options are used






Which two functions is an edge node responsible for? (Choose two.)


A. provides multiple entry and exit points for fabric traffic


B. provides the default exit point for fabric traffic


C. provides the default entry point for fabric traffic


D. provides a host database that maps endpoint IDs to a current location


E. authenticates endpoints





A.
  provides multiple entry and exit points for fabric traffic

D.
  provides a host database that maps endpoint IDs to a current location

What is the structure of a JSON web token?


A. header and payload


B. three parts separated by dots: version, header, and signature


C. payload and signature


D. three parts separated by dots: header, payload. and signature





D.
  three parts separated by dots: header, payload. and signature


Page 3 out of 26 Pages
Previous