00:00

QUESTION 51

- (Exam Topic 2)
An engineer must configure AAA on a Cisco 9800 WLC for central web authentication Which two commands are needed to accomplish this task? (Choose two.)
350-401 dumps exhibit

Correct Answer: CD

QUESTION 52

- (Exam Topic 1)
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?

Correct Answer: C
An EEM policy is an entity that defines an event and the actions to be taken when that event occurs. There are two types of EEM policies: an applet or a script. An applet is a simple form of policy that is defined within the CLI configuration. answer 'event manager applet ondemand event register
action 1.0 syslog priority critical msg ‘This is a message from ondemand’
<="" p="" style="box-sizing: border-box;">
There are two ways to manually run an EEM policy. EEM usually schedules and runs policies on the basis of an event specification that is contained within the policy itself. The event none command allows EEM to identify an EEM policy that can be manually triggered. To run the policy, use either the action policy command in applet configuration mode or the event manager run command
in privileged EXEC mode.
Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/eem/configuration/xe-3s/eem-xe- 3s-book/eem-policy-cli.html

QUESTION 53

- (Exam Topic 1)
An engineer must provide wireless converge in a square office. The engineer has only one AP and believes that it should be placed it in the middle of the room. Which antenna type should the engineer use?

Correct Answer: D

QUESTION 54

- (Exam Topic 2)
A vulnerability assessment highlighted that remote access to the switches is permitted using unsecure and unencrypted protocols Which configuration must be applied to allow only secure and reliable remote access for device administration?

Correct Answer: C

QUESTION 55

- (Exam Topic 2)
Which feature does Cisco TrustSec use to provide scalable, secure communication throughout a network?

Correct Answer: B
Cisco TrustSec uses tags to represent logical group privilege. This tag, called a Security Group Tag (SGT), is used in access policies. The SGT is understood and is used to enforce traffic by Cisco switches, routers and firewalls . Cisco TrustSec is defined in three phases: classification, propagation and enforcement.
When users and devices connect to a network, the network assigns a specific security group. This process is called classification. Classification can be based on the results of the authentication
or by associating the SGT with an IP, VLAN, or port-profile (-> Answer 'security group tag ACL assigned to each port on a switch' and answer 'security group tag number assigned to each
user on a switch' are not correct as they say “assigned … on a switch” only. Answer 'security group tag ACL assigned to each router on a network' is not correct either as it says “assigned to each router”).