Exact 400-351 Exam Questions and Answers 2021

It is impossible to pass Cisco 400-351 exam without any help in the short term. Come to us soon and find the most advanced, correct and guaranteed . You will get a surprising result by our .

Also have 400-351 free dumps questions for you:

NEW QUESTION 1
In Cisco Prime Infrastructure which protocol is used to send traps to northbound notification receivers?

  • A. NMSP
  • B. JSON
  • C. HTTPS
  • D. SNMP

Answer: D

NEW QUESTION 2
Refer to the exhibit
400-351 dumps exhibit
the autonomous AP has a corporate and guest SSID configured . The security team requested that you limit guest user traffic to DHCP ,DNS, and web browsing on the AP. which configuration best satisfies the request?

  • A. access-list 101permit udp any any eq 67 access-list 101permit udp 10.28.128.0 0.0.0.255 host 10128.10.15 eq 53 access-list 101 permit tcp 10.28.128.0.0.0.0.255 any eq 80 access-list 101 deny ip any any interface dot11radio 0 ip access-group 101 in
  • B. access-list 101permit udp any any eq 67 access-list 101permit udp 10.28.128 0.255.255.255 host 10128.10.15 eq 53 access-list 101permit tcp 10.28.128 0.255.255.255 any eq 80 access-list 101deny ip any any interface dot11radio 0 ip access-group 101in
  • C. access-list 101 perm1t udp any any eq 67 access-list 101 per mit udp 10.28.128.0 0.0.0.255 host 10128.10.15 eq 53 access- l1st 101 permit tcp 10.28.128.0 0.0.0.255 any eq 80 access-list 101 deny ip any any interface fast Ethernet 0 ip access-group 101 in
  • D. access-list 101 permit udp any anyeq 67 access-list 101 permit udp 10.28.128 0.255.255.255 host10128.10.15 eq 53 access-list 101 permit tcp 10.28.128 0.255.255.255 any eq 80 access-list 101 deny ip any any interface fast Ethernet 0 ip access-group 101 in

Answer: C

NEW QUESTION 3
Which statement about configuring the date and time on a wireless LAN controller is true?

  • A. When configuring wIPS on the wireless LAN controller you should not use the Universal Time Zone All logs and reports must be time-stamped with the localized time to assist with troubleshooting
  • B. You can configure an authentication channel between the controller and the NTP server
  • C. To set the wireless LAN controller date and time, only NTP should be used Manually configuring data and time is not supported
  • D. As part of their built-in resilience mechanism, Cisco Aironet lightweight access points always connect to the wireless LAN controller independently if the date and time has been set or not

Answer: D

NEW QUESTION 4
RX-SOP is configured for the -80 dBm for 2 4 GHz radio with the value set as Low Threshold. Which two values represent the threshold values for each band? (Choose two)

  • A. -82 dBm for 2 4 GHz
  • B. -85 dBm for 2 4 GHz
  • C. -80 dBm for 5 GHz
  • D. -82 dBm for 5 GHz
  • E. -85 dBm for 5 GHz

Answer: BC

NEW QUESTION 5
Compared to an active survey, which three types of information are lost when performing a passive survey? (Choose three.)

  • A. retransmissions
  • B. uplink information
  • C. PHY rate
  • D. RSSI
  • E. TxBF
  • F. SNR
  • G. rogues

Answer: ABC

NEW QUESTION 6
DRAG DROP
Drag and drop the configuration steps for access point groups on the wireless LAN controller from the left into the correct order on the right.
400-351 dumps exhibit

    Answer:

    Explanation: 400-351 dumps exhibit

    NEW QUESTION 7
    Which key is derived on the client supplicant and the authentication server as a result of the 802.1x/EAP authentication phase?

    • A. Group Temporal Key
    • B. Pairwise Transient Key
    • C. Master Session Key
    • D. Pairwise Master Key

    Answer: C

    NEW QUESTION 8
    Refer to the exhibit.
    400-351 dumps exhibit
    Which option describes what this sequence of commands achievers on a Cisco Autonomus AP?

    • A. This example shows how to permit SNMP access to all objects with read-only permission to only those three specific IP addresses using the community string publi
    • B. The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2
    • C. The community string public is not sent with the traps because is the default community value.
    • D. This example shows how to permit SNMP access to all objects with read-only permission to only those three specific IP addresses using the community string publi
    • E. The access point also sends config traps to the hosts 192.180.1.111 and 192.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2
    • F. The community string public is not sent with the traps.
    • G. This example shows how to permit any SNMP manager to access all objects with read-only permission using the community string publi
    • H. The access point also sends config traps to the hosts 192.180.1.111 and 190.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2
    • I. The community string public is not sent with the traps as this is the default community value.
    • J. This example shows how to permit any SNMP manager to access to all objects with read-only permission using the community string publi
    • K. The access point also sends config traps to the hosts 192.180.1.111 and 190.180.1.33 using SNMPv1 and to the host 192.180.1.27 using SNMPv2
    • L. The community string public is sent with the traps.

    Answer: D

    Explanation: 400-351 dumps exhibit
    http://www.cisco.com/c/en/us/support/docs/ip/simple-network-management-protocol-snmp/7282- 12.html
    Confirmed: test in my demo switch, public default is ro
    400-351 dumps exhibit

    NEW QUESTION 9
    What are two possible EDCA Profile options available for the 802.11a and/or the 802.11b/g radios? (Choose two.)

    • A. Spectralink Voice Priority
    • B. Default Voice
    • C. Custom Voice
    • D. Video Optimized
    • E. EDCA Optimized

    Answer: AC

    NEW QUESTION 10
    With RF group "auto mode", the Cisco WLCs dynamically form an RF neighborhood and elect an RF group leader to maintain a master power and channel scheme for the group For this to work access points on different Cisco WLCs must hear validated neighbor messages at a minimal signal strength What is the minimum signal strength?

    • A. -67dBm
    • B. -70 dBm
    • C. -80dBm
    • D. -90 dBm

    Answer: C

    NEW QUESTION 11
    Flexconnect APs have already deployed in a branch office for local switching.Currently the WLAN in the large auditorium is proposed to change to high-density design and thus some low data rates are proposed to be disabled while keeping the data rates in other areas under the same Cisco WLC.
    Which configuration settings must be modified in the Cisco WLC to achieve this configuration?(choose two)

    • A. FlexconnectgroupS
    • B. Mobility groups
    • C. AP Groups
    • D. RF profiles

    Answer: CD

    NEW QUESTION 12
    Which two IEEE standards improve roaming performances when supported by the wireless infrastructure and the clients? (Choose two.)

    • A. 802.11k
    • B. 802.11h
    • C. 802.11e
    • D. 802.11v
    • E. 802.11i

    Answer: AE

    NEW QUESTION 13
    Which action is needed to edit the settings of an RF profile?

    • A. Disable both radio networks
    • B. Disable custom power level settings for all APs within the group to which the profile is linked.
    • C. Remove the desired RF profile from all AP groups
    • D. RF profiles cannot be edite
    • E. They must be removed and recreated with the desired value

    Answer: C

    Explanation: http://www.cisco.com/c/en/us/td/docs/wireless/controller/8-0/configurationguide/b_cg80/b_cg80_chapter_01011101.html

    NEW QUESTION 14
    You are deploying cisco 792x wireless phones on your on your Cisco unified wireless network . Which two configuration setting are recomended?

    • A. Enable PSPF
    • B. Enable DTPC
    • C. Enable WMM
    • D. Enable PMF

    Answer: BC

    NEW QUESTION 15
    Which statement is true about using fast-secure roaming 802.11r and Cisco Centralized Key Management in a hybrid VoWLAN deployment that has legacy Cisco 7925 and newer Cisco 8821 wireless IP phones, using 802.1X PEAP security?

    • A. Only the FSR method can be configured per WLAN, either 802.11r FT or Cisco CK
    • B. The Cisco 7925 and the Cisco 8821 phones support both of these FSR standards
    • C. You can have only Cisco CKM and not FT 802.1X enabled on the WLA
    • D. In this scenario, the Cisco 7925 and the Cisco 8821 uses Cisco CKM
    • E. You can have only FT 802.1X and not Cisco CKM enabled on the WLA
    • F. The Cisco 8821 uses FT 802.1X and the Cisco 7925 resorts to regular reauthentication
    • G. You can have Cisco CKM and FT 802.1X enabled on the WLA
    • H. The Cisco 7925 uses Cisco CKM, and the Cisco 8821 uses FT 802.1X

    Answer: D

    NEW QUESTION 16
    Which three steps are required during the intial configuration of a Cisco Converged Access controller so that the access points can join? (Choose three)

    • A. The Cisco 5760 controller that acts as a mobility controller can support up to 10000APs.
    • B. Ensure that an active license is enabled with the proper AP count.
    • C. Ensure that the wireless management interface is correctly configured.
    • D. In a Converged Access deployment, the APs must be on the same VLAN as the wireless management interface.
    • E. To enable wireless services, the Cisco 3850 switch must run an ipservices or ipbase license.
    • F. Network connectivity is not necessary because all the APs connect directly to the Converged Access controller.

    Answer: BCE

    NEW QUESTION 17
    How to monitor CPU utilization on a wireless LAN Controller?

    • A. Define the network management system and community in the WLC and a matching v1 or v2 community-string in the network management system to enable the WLC CPU OID to be polled
    • B. Define the network management system as a trap receiver and enable the default RFC 1213 traps, which include SysCPUUtilization
    • C. Define the network management system in the WLC with a matching read-write SNMP community to enable the WLC CPU OID to be polled with an SNMP set by the network management system
    • D. Define an external syslog receiver in the WLC that will receive a syslog message when the percentage of CPU processing ability reaches a preconfigured percentage

    Answer: A

    NEW QUESTION 18
    Which of the below characteristics of RPL is true?

    • A. RPL is designed 1)or lossy networks.
    • B. RPL is an IPv6 link-state routing protocol.
    • C. RPL can send only messages in secured mode.
    • D. RPL uses hello messages to send routing updates to its neighbor

    Answer: A

    Explanation: From:
    http://www.openmote.com/standards/ietf-rpl.html
    http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/rpl/configuration/15-mt/rpl-15-mt-book.html https://datatracker.ietf.org/doc/rfc6550/?include_text=1

    NEW QUESTION 19
    Which description is correct with regard to the operation of an access point in Rogue Location discovery Protocol Mode?

    • A. The AP uses the existing wireless infrastructure in order to scan for rogue AP'
    • B. Once discovered, these rogues are added to a local list that includes the rogue's BSSIDs, MAC addresses and any discovered security provisions (WPA, WEP etc)
    • C. The AP moves to the rogue channel and attempts to connect to the rogue as a clien
    • D. The AP then tries to obtain an IP address and forwards a UDP packet to the controller through the rogu
    • E. If the controller receives this packet, the network administrator is notified that a rogue AP has been discovered on the wired network
    • F. The AP detects a rogue client and then the network administrator is able to contain both the rogue AP and the rogue client
    • G. This can be achieved because 802.11 deauthentication packets are sent to clients that are associated to rogue APs so threats such as holes are mitigated
    • H. The AP determines whether or not a rogue access point is on a trusted networ
    • I. It does not provide RF service of any kind but rather receives periodic rogue access point reports from thecontroller and sniffs all ARP packet
    • J. If it finds a match between an ARP request and a MAC address it receives from the controlle
    • K. It generates a rogue access point alert to the controller

    Answer: B

    100% Valid and Newest Version 400-351 Questions & Answers shared by DumpSolutions, Get Full Dumps HERE: https://www.dumpsolutions.com/400-351-dumps/ (New 371 Q&As)