00:00

QUESTION 81

- (Exam Topic 4)
Simulation 04
350-401 dumps exhibit
350-401 dumps exhibit
Solution:
R1
Router ospf 1 Int loop0
Ip ospf 1 area 0 Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point Copy run start
R2
Router ospf 1 Int loop0
Ip ospf 1 area 0 Int et0/0
Ip ospf 1 area 0
Ip ospf network point-to-point Copy run start
Verification:
350-401 dumps exhibit
350-401 dumps exhibit

Does this meet the goal?

Correct Answer: A

QUESTION 82

- (Exam Topic 3)
An engineer must configure a router to leak routes between two VRFs Which configuration must the engineer apply?
350-401 dumps exhibit
350-401 dumps exhibit

Correct Answer: B

QUESTION 83

- (Exam Topic 1)
Refer to the exhibit.
350-401 dumps exhibit
An engineer must deny Telnet traffic from the loopback interface of router R3 to the loopback interface of router R2 during the weekend hours. All other traffic between the loopback interfaces of routers R3 and R2 must be allowed at all times. Which command accomplish this task?
A)
350-401 dumps exhibit
B)
350-401 dumps exhibit
C)
350-401 dumps exhibit
D)
350-401 dumps exhibit

Correct Answer: C
We cannot filter traffic that is originated from the local router (R3 in this case) so
we can only configure the ACL on R1 or R2. “Weekend hours” means from Saturday morning through Sunday night so we have to configure: “periodic weekend 00:00
to 23:59”.
Note: The time is specified in 24-hour time (hh:mm), where the hours range from 0 to 23 and the minutes range from 0 to 59.

QUESTION 84

- (Exam Topic 3)
Refer to the exhibit.
350-401 dumps exhibit
An engineer must set up connectivity between a campus aggregation layer and a branch office access layer. The engineer uses dynamic trunking protocol to establish this connection, however, management traffic on VLAN1 is not passing. Which action resolves the issue and allow communication for all configured VLANs?

Correct Answer: C

QUESTION 85

- (Exam Topic 1)
Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Correct Answer: D
One of the best practices to secure REST APIs is using password hash. Passwords must always be hashed to protect the system (or minimize the damage) even if it is compromised in some hacking attempts. There are many such hashing algorithms which can prove really effective for password security e.g. PBKDF2, bcrypt and scrypt algorithms.
Other ways to secure REST APIs are: Always use HTTPS, Never expose information on URLs (Usernames, passwords, session tokens, and API keys should not appear in the URL),
Adding Timestamp in Request, Using OAuth, Input Parameter Validation. Reference: https://restfulapi.net/security-essentials/