A) B) C) Cisco 350-401 Exam Valid | Pass273
D) A.Option A B.Option B C.Option C D.Option D Answer: D Explanation: QUESTION NO: 366 How does Protocol Independent Multicast function? A.In sparse mode it establishes neighbor adjacencies and sends hello messages at 5-second intervals. B.It uses the multicast routing table to perform the multicast forwarding function. C.It uses unicast routing information to perform the multicast forwarding function. D.It uses broadcast routing information to perform the multicast forwarding function. Answer: C Explanation:Although PIM is called a multicast routing protocol, it actually uses the unicast routing table to perform the reverse path forwarding (RPF) check function instead of building up a completely independent multicast routing table. Unlike other routing protocols, PIM does not send and receive routing updates between routers. Reference: - pim-xe-16-book/imc-tech-oview.html QUESTION NO: 367 Which technology does VXLAN use to provide segmentation for Layer 2 and Layer 3 traffic? A.bridge domain Cisco 350-401 Exam Valid | Pass274
B.VLAN C.VRF D.VNI Answer: D Explanation:VXLAN has a 24-bit VXLAN network identifier (VNI), which allows for up to 16 million (= 224) VXLAN segments to coexist within the same infrastructure. This surely solve the small number of traditional VLANs. QUESTION NO: 368 What are two methods of ensuring that the multicast RPF check passes without changing the unicast routing table? (Choose two.) A.implementing static mroutes B.disabling BGP routing protocol C.implementing MBGP D.disabling the interface of the router back to the multicast source E.implementing OSPF routing protocol Answer: A,C Explanation:QUESTION NO: 369 Under which network conditions is an outbound QoS policy that is applied on a router WAN interface most beneficial? A.under all network conditions B.under network convergence conditions C.under traffic classification and marking conditions D.under interface saturation conditions Answer: C Explanation: QUESTION NO: 370 What is provided by the Stealthwatch component of the Cisco Cyber Threat Defense solution? Cisco 350-401 Exam Valid | Pass275
A.real-time threat management to stop DDoS attacks to the core and access networks B.real-time awareness of users, devices and traffic on the network C.malware control D.dynamic threat control for web traffic Answer: A Explanation:Cisco Stealthwatch is a comprehensive, network telemetry-based, security monitoring and analytics solution that streamlines incident response through behavioral analysis; detecting denial of service attacks, anomalous behaviour, malicious activity and insider threats.
Want to read all 305 pages?
Previewing 277 of 305 pages Upload your study docs or become a member.
Want to read all 305 pages?
Previewing 277 of 305 pages Upload your study docs or become a member.
End of preview
Want to read all 305 pages? Upload your study docs or become a member.