freefiles

Cisco 350-401 Exam Dumps & Practice Test Questions

Question No 1:

In a Cisco SD-Access (Software-Defined Access) environment, several components collaborate to deliver automated policy enforcement, segmentation, and scalable network design. One specific element, the fusion router, plays a pivotal role in inter-VN communication. 

What is the primary responsibility of the fusion router within this architecture?

A. Serves as the DNS resolver for devices operating inside the SD-Access fabric
B. Improves internal fabric performance by taking over some traffic forwarding duties
C. Enables selective routing between isolated virtual networks and shared external services
D. Connects the SD-Access fabric directly to internet services and external routing domains

Correct Answer: C

Explanation:

In a Cisco Software-Defined Access (SD-Access) network, virtual networks (VNs)—essentially logical Layer 3 network segments—are used to enforce traffic isolation and segmentation. These VNs are often implemented using VRFs (Virtual Routing and Forwarding instances) to separate traffic belonging to different departments, user roles, or applications. This segmentation enhances both security and policy compliance.

However, organizations often need certain shared services—such as DNS servers, Active Directory, or internet gateways—to be accessible from multiple VNs. Because VRFs do not inherently allow traffic to pass between each other, a special component is needed to manage this cross-VN communication while preserving the isolation model.

This is where the fusion router comes in. The fusion router resides outside the SD-Access fabric and connects to it through the border nodes. Its primary function is to perform route leaking, which means it selectively redistributes routes between VRFs. By doing so, it allows limited and controlled communication between VNs and between VNs and external networks, without collapsing the segmentation provided by SD-Access.

For example, a user in “Student_VN” may need to access a shared DNS server that resides in the “Services_VN.” The fusion router facilitates this by leaking only the necessary routes, allowing DNS queries to be resolved without giving full network access between VNs.

It’s important to clarify that the fusion router is not a DNS server, nor does it handle internal packet forwarding within the fabric. It also doesn’t serve as the direct link to the internet, although it may connect to shared internet gateways as part of its function.

Therefore, the most accurate answer is C: the fusion router enables route leaking between isolated virtual networks and shared service domains, making it essential for inter-VN communication in a segmented SD-Access deployment.

Question No 2:

In a Cisco SD-WAN deployment, the architecture includes several core components responsible for orchestration, control, and management of the network. 

What is the primary task of the vSmart controller in this system?

A. Handles the initial authentication and registration of vEdge routers into the SD-WAN fabric
B. Collects operational metrics and telemetry from edge devices for analytics
C. Distributes routing intelligence and policy definitions to enable secure overlay tunnels between vEdge devices
D. Centrally manages device configurations and monitors network-wide performance status

Correct Answer: C

Explanation:

The Cisco SD-WAN solution relies on a distributed architecture composed of multiple specialized components, each serving a key function in the overall management of the Wide Area Network. Among these, the vSmart controller serves as the brain of the control plane, playing a central role in ensuring secure, intelligent routing across the WAN.

The vSmart controller's primary responsibility is to distribute routing information and enforce security policies to all vEdge (or cEdge) routers within the SD-WAN overlay. This includes defining which traffic can flow between which devices and under what conditions, essentially governing the formation of encrypted data tunnels between sites.

To perform this function, vSmart uses a proprietary protocol known as the Overlay Management Protocol (OMP) to share routing information, TLOCs (Transport Locators), and security policies with connected vEdge devices. This ensures that each vEdge has complete, accurate, and real-time information about how to reach other devices in the SD-WAN network, facilitating dynamic and policy-driven traffic routing.

By contrast:

  • The vBond orchestrator (Option A) is responsible for authenticating and onboarding new devices into the fabric. It enables the initial control connections and NAT traversal.

  • vManage (Options B and D) is the centralized GUI-based network management system used to monitor devices, push configurations, collect telemetry, and manage lifecycle operations.

  • While these are vital components, only vSmart manages route advertisement, policy distribution, and overlay security.

Moreover, vSmart ensures segmentation by distributing VPN (or VRF) policies, handles QoS (Quality of Service) configurations, and enables application-aware routing to optimize traffic paths based on SLA and performance needs.

In essence, vSmart is the policy engine of the SD-WAN. Without it, the overlay would lack the intelligence required to securely and efficiently route traffic across the WAN.

Thus, the correct answer is C—the vSmart controller distributes security and routing policies, ensuring the SD-WAN operates with agility, scalability, and security.

Question No 3:

In a Cisco SD-Access wireless environment, what is the correct role of a wireless access point in the context of the fabric architecture?

A. The access point is part of the fabric overlay
B. The wireless client is part of the fabric overlay
C. The access point is part of the fabric underlay
D. The Wireless LAN Controller (WLC) is part of the fabric underlay

Correct Answer: A

Explanation:

In Cisco’s Software-Defined Access (SD-Access) architecture, the network infrastructure is divided into two major logical layers: the fabric underlay and the fabric overlay. The underlay consists of the physical network infrastructure, including routers and switches that provide basic IP connectivity. This layer establishes a robust routing environment typically using protocols like IS-IS and supports communication between fabric nodes.

The overlay, on the other hand, is a virtual network that sits atop the underlay. It utilizes VXLAN (Virtual Extensible LAN) tunnels to encapsulate user traffic and applies policies, segmentation, and mobility features. This is where the identity-based and policy-driven nature of SD-Access comes into play.

In the context of SD-Access wireless deployments, wireless access points (APs) serve as integral components of the fabric overlay. The APs establish VXLAN tunnels directly with fabric edge nodes. This allows them to participate in the same policy enforcement, segmentation, and mobility features that wired devices benefit from in the fabric overlay.

It's important to note that wireless clients—such as smartphones or laptops—are not part of the overlay themselves; they are external endpoints connecting to it through the APs. Similarly, the Wireless LAN Controller (WLC) plays a role in managing policy and control for wireless but is not part of the fabric underlay.

Understanding these roles is essential for correctly designing and troubleshooting SD-Access wireless environments. The access point, by serving as a VXLAN tunnel endpoint and forwarding traffic into the fabric, is considered part of the fabric overlay—enabling seamless integration of wireless traffic into the software-defined fabric.

Question No 4:

Within a Cisco SD-Access fabric, what is the main responsibility of a fabric edge node?

A. To link the SD-Access fabric with external Layer 3 networks
B. To connect wired endpoints like user devices to the SD-Access fabric
C. To advertise fabric IP prefixes to non-fabric routers
D. To interface with the fusion router for inter-policy communication

Correct Answer: B

Explanation:

In Cisco’s Software-Defined Access (SD-Access) framework, a fabric edge node acts as the principal gateway for wired endpoints such as user desktops, laptops, IP phones, printers, and other hosts to enter the fabric. It is a key access-layer switch that performs multiple functions that are essential for endpoint onboarding and network policy enforcement.

One of the core responsibilities of a fabric edge node is to register endpoint devices with the fabric's control plane using information like MAC addresses, IP addresses, and identity data. Once registered, traffic to and from these endpoints can be directed intelligently across the SD-Access network.

The fabric edge node also applies policy-based segmentation using technologies like Scalable Group Tags (SGTs), which are part of Cisco TrustSec. These policies help isolate different device types or user groups without relying on traditional VLAN or IP-based segmentation.

Furthermore, the edge node encapsulates user traffic using VXLAN, a tunneling protocol used in the fabric overlay. This ensures that traffic remains isolated and properly segmented as it traverses the SD-Access fabric.

Other types of nodes in the SD-Access architecture include border nodes, which handle communication between the fabric and external networks, and fusion routers, which enable inter-VRF routing. However, these nodes have different roles compared to the edge node. While border nodes and fusion routers facilitate external integration and routing, the fabric edge node's focus is internal—specifically, providing connectivity and policy enforcement for devices connecting directly to the enterprise network.

In summary, the fabric edge node is the entry point for wired devices into the SD-Access fabric and is responsible for applying identity-based policies, registering endpoints, and handling VXLAN encapsulation. This makes option B the most accurate choice.

Question No 5:

What are two key benefits that might encourage an organization to choose cloud infrastructure instead of managing their systems on-premises? (Select two options.)

A. Cloud billing is usage-based and scales with demand, while on-premises infrastructure requires fixed investments regardless of actual resource utilization.
B. Cloud platforms offer automatic scalability in response to demand, while on-premises environments typically require manual upgrades and capital spending.
C. In cloud environments, businesses gain full control over access to their data, while on-premises environments may lose access during service outages.
D. Cloud solutions require organizations to manage all technical issues directly, whereas on-premises systems rely on external vendors for support.
E. Cloud deployments involve long setup times due to capital planning, while on-premises environments can be implemented quickly using operational budget models.

Correct Answers: A, B

Explanation:

Choosing cloud computing over on-premises infrastructure is often driven by two major advantages: cost flexibility and automated scalability—both of which align with modern business needs for agility and efficiency.

Cost Flexibility (A):
In cloud computing, companies pay only for the resources they actually consume. This pay-as-you-go model ensures that IT expenses scale with actual usage, making budgeting more predictable and minimizing waste. There is no need for large upfront investments in physical servers, networking equipment, or dedicated data center space. On the contrary, traditional on-premises models require capital expenditures for hardware, ongoing electricity, and physical security—even when the infrastructure isn’t fully utilized. This results in higher total cost of ownership and potential underutilization of resources.

Automatic Scalability (B):
Cloud infrastructure is designed to expand or shrink based on real-time demand. This elasticity enables businesses to respond to fluctuating workloads instantly—for example, scaling up during high-traffic events like product launches or seasonal sales, and scaling down during off-peak times. This dynamic approach eliminates the need for overprovisioning. In contrast, scaling an on-premises system means purchasing, installing, and configuring additional hardware—an expensive and time-consuming process that can delay responsiveness.

Ultimately, cloud services enable organizations to remain agile, control costs more effectively, and eliminate many of the inefficiencies associated with managing physical infrastructure. These advantages are especially valuable to businesses aiming for rapid innovation and global reach without the burden of maintaining their own data centers.

Question No 6:

What distinguishes a MAC address table from Ternary Content Addressable Memory (TCAM) in how network switches and routers process data for forwarding and policy enforcement?

A. TCAM supports Layer 2 switching operations, while CAM is exclusively used for Layer 3 routing.
B. Routing lookups occur in CAM, while MAC address matching is done using TCAM.
C. MAC tables rely on pattern-based matching, while TCAM only performs exact matches.
D. MAC address tables are built using CAM, while TCAM is used for storing ACLs and QoS configurations.

Correct Answer: D

Explanation:

In networking devices such as switches and routers, both Content Addressable Memory (CAM) and Ternary Content Addressable Memory (TCAM) play crucial roles, but they serve distinctly different purposes based on the type of lookup required.

CAM (for MAC address tables):
CAM is engineered for high-speed, exact match lookups, making it ideal for storing MAC address tables in switches. When an Ethernet frame arrives, the switch references the CAM to find the destination MAC address and determine the appropriate output port. This operation is simple and fast, which suits the need for rapid Layer 2 forwarding. CAM memory stores entries like MAC addresses and port numbers, enabling quick packet switching within a LAN.

TCAM (for ACLs, QoS, and routing policies):
TCAM, unlike CAM, can handle more complex matching logic. It uses a three-state logic: 0, 1, and “don’t care,” which supports wildcard-based matches. This is essential for implementing features like Access Control Lists (ACLs), Quality of Service (QoS), and route lookups based on longest prefix matches. TCAM allows the switch or router to apply multiple rules to a single packet in parallel, enabling powerful policy enforcement at Layers 3 and 4.

For example, an ACL might permit all traffic from a certain subnet while denying access from another. Such logic cannot be executed using CAM alone. TCAM excels in these scenarios by efficiently evaluating multiple criteria simultaneously.

In essence, CAM is fast and suited for basic switching functions that require exact matches (like MAC address resolution), while TCAM is indispensable for more advanced decision-making tasks in modern network environments.

Understanding the distinction between CAM and TCAM is vital for optimizing device performance and ensuring efficient implementation of routing, security, and traffic management policies.

Question No 7: 

Within the Cisco SD-WAN architecture, which component acts as the centralized management system, providing a unified graphical interface for configuration, monitoring, and troubleshooting across the entire SD-WAN environment?

A. vBond
B. vSmart
C. vManage
D. vEdge

Correct Answer: C

Explanation:

In the Cisco SD-WAN architecture, effective network management relies heavily on centralized visibility and control. This is where vManage plays a vital role. It functions as the main point of management, offering network administrators a single-pane-of-glass interface to oversee the entire SD-WAN deployment. This includes configuring network policies, monitoring device health, and troubleshooting issues across distributed sites.

vManage streamlines complex network tasks through an intuitive graphical user interface (GUI) and robust RESTful APIs. These tools enable IT teams to deploy updates, enforce security policies, monitor real-time performance, and manage large-scale configurations with greater agility and less manual intervention. This centralized functionality becomes particularly valuable in multi-branch environments where consistency, automation, and rapid deployment are essential.

Other components of Cisco’s SD-WAN have their own distinct functions but do not offer the same level of centralized management. For instance, vBond serves as the orchestrator that authenticates devices and helps establish secure tunnels between network elements. While critical for initial connectivity, it does not provide configuration or monitoring capabilities.

vSmart is responsible for control plane operations like policy distribution and routing decisions. It ensures that the right traffic rules are enforced across the network. However, it lacks a user interface and isn't meant for administrative tasks like configuration or monitoring.

vEdge devices operate at the network edge, facilitating data plane traffic at branch locations. They execute the policies set by vSmart but are not involved in centralized management tasks.

In essence, while vBond, vSmart, and vEdge all contribute to a functional SD-WAN solution, vManage is the only component that gives administrators a complete, centralized management experience. It enables a streamlined operational workflow, making it the cornerstone for visibility, control, and orchestration in Cisco SD-WAN environments.

Question No 8:

When a company plans to evolve its campus network to a more flexible and programmable structure using intent-based networking (IBN), 

Which network design model best supports a smooth transition from a traditional setup to a software-defined, fabric-based architecture?

A. Two-tier architecture
B. Layer 2 access design
C. Three-tier architecture
D. Routed access design

Correct Answer:  D

Explanation:

As enterprise networks move toward intent-based networking (IBN), a foundational shift occurs in how networks are designed and managed. Traditional network designs like three-tier or Layer 2 access models are no longer sufficient to support the flexibility, automation, and segmentation needed for modern software-defined environments.

The routed access design is the most suitable architecture for enabling a seamless migration to an intent-based network. This design brings Layer 3 routing directly to the access layer, eliminating reliance on protocols like Spanning Tree and reducing convergence times. With each access switch functioning as a Layer 3 device, the network becomes more scalable, fault-tolerant, and easier to automate.

This model aligns well with technologies that support programmable network fabrics, such as Cisco’s Software-Defined Access (SD-Access), which is a key enabler of IBN. Routed access simplifies the implementation of features like VXLAN, LISP, and micro/macro segmentation, which are essential for dynamic policy enforcement and workload mobility across the network.

In contrast, traditional models like the three-tier architecture (core, distribution, access) are less agile and more complex to manage at scale. They often rely on Layer 2 connectivity and STP, which limits flexibility and slows convergence. Similarly, Layer 2 access designs are inadequate for supporting modern segmentation and routing requirements.

While a two-tier architecture offers simplicity and reduced latency, it does not inherently provide the Layer 3 boundaries or programmability that routed access delivers. It might simplify hardware deployment but doesn't meet the architectural demands of IBN.

By adopting a routed access model, organizations future-proof their campus networks, enabling better integration with SDN controllers and automation platforms. This approach enhances network efficiency, accelerates policy implementation, and lays the groundwork for a fabric-based design where centralized intent can be consistently translated into network behavior.

Therefore, routed access design is the most effective choice for companies seeking to modernize their networks and transition toward an intent-driven, programmable infrastructure.

Question No 9:

In Cisco's Software-Defined Access (SD-Access) architecture, what is the correct mode of operation and necessary connection for a fabric access point (AP)?

A. The fabric AP operates in local mode and must connect directly to the fabric edge switch.
B. The fabric AP operates in local mode and must connect directly to the fabric border node.
C. The fabric AP operates in FlexConnect mode and must connect directly to the fabric border node.
D. The fabric AP operates in FlexConnect mode and must connect directly to the fabric edge switch.

Correct Answer:
A. The fabric AP operates in local mode and must connect directly to the fabric edge switch.

Explanation:

In Cisco's Software-Defined Access (SD-Access) network architecture, fabric access points (APs) are key components that provide wireless connectivity within the SD-Access domain. These APs must adhere to specific operational configurations and connectivity requirements to function properly within the SD-Access fabric.

The fabric APs need to be directly connected to a fabric edge switch, which is a switch that is part of the SD-Access fabric. The fabric edge switch plays an essential role as it serves as the Layer 3 gateway for all endpoints within its segment. By connecting to this switch, the fabric AP can establish communication with the fabric's control and data planes, allowing for seamless operation of both wireless and wired devices within the fabric.

It is important to note that fabric APs operate in local mode. In this mode, all wireless client traffic is tunneled back to the wireless controller, allowing for centralized management and enforcement of policies. The local mode ensures that the SD-Access network maintains full control and monitoring of all traffic, which is a key feature for maintaining network consistency and security.

On the other hand, FlexConnect mode is not used in SD-Access deployments. FlexConnect mode is typically applied in branch or remote office environments where WAN connections to the central controller might be unreliable. This mode allows for local switching, meaning client traffic can be handled locally without being sent back to the controller. However, in SD-Access, FlexConnect bypasses the integrated policies and segmentation, which is not desirable in a unified SD-Access architecture.

Additionally, fabric access points should not be connected to a fabric border node. Border nodes are responsible for interfacing the SD-Access fabric with external networks, such as the internet or legacy networks, and are not designed to handle AP connectivity.

Thus, the correct configuration for fabric access points in SD-Access is to operate in local mode, with a direct connection to the fabric edge switch.

Question  No 10:

Which of the following protocols is used to establish a secure management connection to network devices for configuration and monitoring?

A) HTTP
B) Telnet
C) SSH
D) FTP

Correct Answer: C

Explanation:
To understand why SSH (Secure Shell) is the correct answer, it’s important to recognize the role each protocol plays in managing network devices securely.

  • SSH (Secure Shell) is a cryptographic network protocol designed for secure communication over a potentially insecure network. It is widely used for remote administration and management of network devices such as routers, switches, and firewalls. Unlike earlier protocols, SSH provides encrypted communication, ensuring that sensitive data like passwords and configuration commands are protected from eavesdropping and man-in-the-middle attacks. SSH operates on port 22 and supports both interactive command-line sessions and file transfers, making it ideal for secure management of devices.

  • HTTP (HyperText Transfer Protocol) is a protocol used primarily for transferring hypertext documents, like web pages, over the internet. Although HTTP is commonly used for web-based management of devices (especially in a browser interface), it does not encrypt the data being transmitted, which makes it unsuitable for secure management tasks.

  • Telnet is a protocol that provides a command-line interface for remote management of devices. However, Telnet is not secure because it transmits data, including passwords, in clear text, making it highly vulnerable to interception. For this reason, Telnet has been largely replaced by SSH in secure network management practices.

  • FTP (File Transfer Protocol) is used for transferring files between a client and server. While it can be used in some network device management scenarios, it is not primarily intended for remote device configuration or monitoring. Additionally, FTP sends data in clear text, and there are more secure alternatives like SFTP (Secure FTP) that are preferred for file transfers.

In summary, SSH (Secure Shell) is the best choice for establishing a secure management connection to network devices because it encrypts the data, protecting the integrity and confidentiality of network configurations and management tasks.