350-401 Exam Questions

Total 253 Questions

Last Updated Exam : 16-Jul-2025

Topic 1: Exam Pool A


A. Option A


B. Option B


C. Option C


D. Option D





C.
  Option C

Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis?


A. Cisco Firepower and FireSIGHT


B. Cisco Stealth watch system


C. Advanced Malware Protection


D. Cisco Web Security Appliance





B.
  Cisco Stealth watch system

An engineer measures the Wi-Fi coverage at a customer site. The RSSI values are recorded as follows:

  • LocationA -72dBm
  • Location B:-75 dBm
  • Location C; -65 dBm
  • Location D -80 dBm
Which two statements does the engineer use to explain these values to the customer?
(Choose two.)


A. The signal strength at location B is 10 dB better than location C.


B. The signal strength at location C is too weak to support web surfing


C. Location D has the strongest RF signal strength.


D. The RF signal strength at location B is 50% weaker than location A.


E. The RF signal strength at location C is 10 times stronger than location B





B.
  The signal strength at location C is too weak to support web surfing

E.
  The RF signal strength at location C is 10 times stronger than location B

Refer to the exhibit. An engineer must create a script that appends the output of the show process cpu sorted command to a file.


A. action 4.0 syslog command "show process cpu sorted | append flash:high-cpu-file"


B. action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"


C. action 4.0 ens-event "show process cpu sorted | append flash:high-cpu-file"


D. action 4.0 publish-event "show process cpu sorted | append flash:high-cpu-file"





B.
  action 4.0 cli command "show process cpu sorted | append flash:high-cpu-file"

Which RF value represents the decline of the RF signal amplitude over a given distance"?


A. signal-to-noise ratio


B. received signal strength indicator


C. free space path loss


D. effective isotropic radiated power





C.
  free space path loss

What is one characteristic of Cisco SD-Access networks?


A. Devices are assigned to virtual networks based on their VLAN membership.


B. Scalable group tags are used for macrosegmentatlon.


C. Virtual networks are used for microsegmentation.


D. All traffic is Layer 3 within the fabric





B.
  Scalable group tags are used for macrosegmentatlon.

How can an engineer prevent basic replay attacks from people who try to brute force a system via REST API?


A. Add a timestamp to the request in the API header.


B. Use a password hash.


C. Add OAuth to the request in the API header.


D. Use HTTPS.





A.
  Add a timestamp to the request in the API header.

What is a characteristic of a Type 2 hypervisor?


A. quick deployment


B. ideal for data center


C. complicated deployment


D. referred to as bare-metal





A.
  quick deployment

Which language defines the structure or modelling of data for NETCONF and RESTCONF?


A. JSON


B. YANG


C. XML


D. YAML





B.
  YANG

What is the recommended minimum SNR for data applications on wireless networks?


A. 15


B. 20


C. 25


D. 10





C.
  25


Page 8 out of 26 Pages
Previous