ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 13

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit. An engineer needs to implement streaming telemetry on a cisco MDS 9000 series switch. The requirement is for the show command data to be collected every 30 seconds and sent to receivers. Which command must be added to the configuration meet this requirement?

A.

Sensor-grp 200 sample-period 30000

A.

Sensor-grp 200 sample-period 30000

Answers
B.

Snsr-grp 200 sample-interval 30

B.

Snsr-grp 200 sample-interval 30

Answers
C.

Sensor-grp 200 sample-period 30

C.

Sensor-grp 200 sample-period 30

Answers
D.

Snsr-grp 200 sample-interval 30000

D.

Snsr-grp 200 sample-interval 30000

Answers
Suggested answer: D

Explanation:

To meet the requirement of collecting show command data every 30 seconds and sending it to receivers, the command must specify the sample interval in milliseconds. Therefore, the correct command isSnsr-grp 200 sample-interval 30000, which sets the sample interval to 30,000 milliseconds (equivalent to 30 seconds).

A cisco Nexus 9000 series switch experiences a startup configuration comuption. The engineer must implement a procedure to recover configuration file from the switch. Which command set must be used?

A.

1. Copy the running-configuration to the startup configuration. 2. Clear the current configuration of the switch. 3. Restart the device. 4. Copy a previously saved configuration file to the running configuration.

A.

1. Copy the running-configuration to the startup configuration. 2. Clear the current configuration of the switch. 3. Restart the device. 4. Copy a previously saved configuration file to the running configuration.

Answers
B.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy the running configuration to the startup configuration 4. Copy a previously saved configuration file to the running configuration

B.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy the running configuration to the startup configuration 4. Copy a previously saved configuration file to the running configuration

Answers
C.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy a previously saved configuration file to the running-configuration 4. Copy the running-configuration to the startup configuration.

C.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy a previously saved configuration file to the running-configuration 4. Copy the running-configuration to the startup configuration.

Answers
D.

1.Restarting device. 2. Copy the running-configuration file to a remote server. 3. Clear the current configuration of the switch. 4. Copy the running configuration to the startup configuration

D.

1.Restarting device. 2. Copy the running-configuration file to a remote server. 3. Clear the current configuration of the switch. 4. Copy the running configuration to the startup configuration

Answers
Suggested answer: C

Explanation:

When a Cisco Nexus 9000 series switch encounters a startup configuration corruption, the recovery process involves clearing the current configuration, restarting the device, and then restoring the configuration from a previously saved file. The correct sequence is to first clear the configuration to prevent the corrupted startup configuration from loading upon restart. After restarting the device, the previously saved configuration file should be copied to the running configuration. Finally, to ensure the switch starts with the correct configuration in future restarts, the running configuration should be saved to the startup configuration.

An engineer must configure OSPF in the data center. The external routes have already been redistributed OSPF. The network must meet these criteria:

* The data centre servers must reach services in the cloud and the services behind the redistributed routes.

* The exit point toward the internet should be propagated only when there is a dynamically learned default route from the upstream router.

Which feature is required?

A.

Default-information originate

A.

Default-information originate

Answers
B.

Stubby area

B.

Stubby area

Answers
C.

Totally stubby area

C.

Totally stubby area

Answers
D.

Default-information originate always

D.

Default-information originate always

Answers
Suggested answer: A

Explanation:

The requirement for the data center servers to reach services in the cloud and services behind redistributed routes, along with the condition that the exit point toward the internet should only be propagated when there is a dynamically learned default route, necessitates the use of the 'default-information originate' OSPF feature. This feature allows the advertisement of the default route in OSPF when it is present in the routing table, which is the case when it is dynamically learned from the upstream router.

https://learningnetwork.cisco.com/s/question/0D53i00000Kt544/defaultinformationoriginate-always

What is a characteristic of the install all command on the cisco Nexus series switch?

A.

Upgrades only certain modules

A.

Upgrades only certain modules

Answers
B.

Automatically checks the image integrity

B.

Automatically checks the image integrity

Answers
C.

Impact data plan traffic

C.

Impact data plan traffic

Answers
D.

Continues the upgrade process if any step in the sequence fails

D.

Continues the upgrade process if any step in the sequence fails

Answers
Suggested answer: B

Explanation:

A characteristic of the install all command on the Cisco Nexus series switch is that it automatically checks the image integrity before performing the installation. The install all command is used to install a system image and kickstart image on the switch, as well as to upgrade the BIOS and other firmware components. The install all command performs a series of checks and validations before installing the images, such as verifying the compatibility, checksum, and signature of the images. This ensures that the images are not corrupted or tampered with, and that they match the hardware and software requirements of the switch. The install all command also performs a backup of the current configuration and images, and allows the user to abort the installation process if needed.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 3: Data Center LAN Network Connectivity, Lesson 3.4: Cisco Nexus 9000 Series Switches

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x), Chapter: Installing Software Images and EPLDs, Section: Installing System and Kickstart Images

An engineer is using REST API calls to configure the cisco APIC. Which data structure must be used within a post message to receive a login token?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

The correct data structure to use within a POST message to receive a login token when configuring the Cisco APIC via REST API calls is an XML payload that includes thetags with nested<name>andtags for the username and password. This structure is shown in Option A, which is the standard format for authentication requests to the Cisco APIC.

The EPLD update of the supervisor module has been scheduled for several cisco MDS 9000 switches. What will be the impact of the update?

A.

All control plane traffic is stopped for the duration of the EPLD update and the switch remain operational for the duration of the upgrade.

A.

All control plane traffic is stopped for the duration of the EPLD update and the switch remain operational for the duration of the upgrade.

Answers
B.

The redundant supervisor lakes over while the EPLD update is in progress and there is no service disruption.

B.

The redundant supervisor lakes over while the EPLD update is in progress and there is no service disruption.

Answers
C.

All traffic is stopped for the duration of the EPLD update and the switch is rebooted after the upgrade is completed.

C.

All traffic is stopped for the duration of the EPLD update and the switch is rebooted after the upgrade is completed.

Answers
D.

The redundant supervisor lakes while the EPLD update is in progress and the switch is rebooted after the upgrade is completed.

D.

The redundant supervisor lakes while the EPLD update is in progress and the switch is rebooted after the upgrade is completed.

Answers
Suggested answer: B

Explanation:

The impact of the EPLD update of the supervisor module on the Cisco MDS 9000 switches is that the redundant supervisor takes over while the EPLD update is in progress and there is no service disruption. EPLD (Electronic Programmable Logic Device) is a firmware component that controls the functionality of various hardware modules on the switch, such as the supervisor, line cards, and fabric modules. The EPLD update is performed to enhance the performance and features of the hardware modules, and to fix any bugs or issues. The EPLD update process requires a reload of the affected module, which can cause a temporary loss of connectivity and traffic. However, if the switch has a redundant supervisor module configured in high availability mode, the EPLD update can be performed without any service disruption. This is because the redundant supervisor takes over the control plane functions while the active supervisor is being updated, and then switches back to the active supervisor when the update is completed. The EPLD update does not affect the data plane traffic, as the line cards and fabric modules continue to forward packets during the update process.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 7: Data Center Storage Connectivity, Lesson 7.3: Fibre Channel Protocol

Cisco MDS 9000 Family NX-OS System Management Configuration Guide, Chapter: Installing Software Images and EPLDs, Section: Updating EPLDs

An engineer configures an intersignt virtual application and must claim over 200 targets. The engineer starts the Claim target procedure. The engineer has prepared this initial comma- separated value file to provision the targets:

Which Information must be included In the comma-separated value flit to provision the targets?

A.

FQON, AD name, IP address, email

A.

FQON, AD name, IP address, email

Answers
B.

location, address, name. password

B.

location, address, name. password

Answers
C.

certificate, user name, password. email

C.

certificate, user name, password. email

Answers
D.

target type, hostname or P address, user name, password

D.

target type, hostname or P address, user name, password

Answers
Suggested answer: D

Explanation:

When configuring an Intersight virtual application and claiming targets, the information required in the comma-separated value (CSV) file for provisioning includes the target type, hostname or IP address, user name, and password. This set of information is necessary to uniquely identify and authenticate each target for the claim process.

What is an advantage of NFSv4 over Fibre Channel protocol?

A.

Improved security

A.

Improved security

Answers
B.

Lossless throughout

B.

Lossless throughout

Answers
C.

Congestion management

C.

Congestion management

Answers
D.

Uses IP transport

D.

Uses IP transport

Answers
Suggested answer: A

Explanation:

NFSv4 offers several advantages over Fibre Channel protocol, one of which is improved security. NFSv4 is designed to be more secure than its predecessors, providing strong security features that are not inherent in Fibre Channel. It includes mechanisms for authentication, integrity, and privacy, which are part of its standard protocol suite. NFSv4 also integrates well with security infrastructures like Kerberos, allowing for secure, authenticated access to file systems over a network.

Which two configuration settings are available in the in the cisco UCS flmware Auto sync server policy?

A.

User Notification

A.

User Notification

Answers
B.

User Acknowledge

B.

User Acknowledge

Answers
C.

No Action

C.

No Action

Answers
D.

Delayed Action

D.

Delayed Action

Answers
E.

Immediate Action

E.

Immediate Action

Answers
Suggested answer: B, C

Explanation:

The Cisco UCS firmware Auto Sync Server policy includes several configuration settings that determine how and when firmware on servers is synchronized. The two available settings from the options provided are 'User Acknowledge' and 'No Action'. 'User Acknowledge' requires an administrator to manually acknowledge firmware upgrades in the Pending Activities dialog box before they are applied. 'No Action' means no firmware upgrade is initiated on the server. These settings allow administrators to control the firmware synchronization process according to their operational policies and procedures.

An administrator is implementing DCNM so that events are triggered when monitored traffic exceeds the configured present utili zation threshold. The requirement is to configuration a maximum limit of 39860437 bytes that applies directly to the statistics collected as a ratio of the total link capacity. Which DCNM performance monitoring configuration parameter must be implemented to achieve this result?

A.

Absolution Values

A.

Absolution Values

Answers
B.

Baseline

B.

Baseline

Answers
C.

Utill%

C.

Utill%

Answers
D.

Per port Monitoring

D.

Per port Monitoring

Answers
Suggested answer: C

Explanation:

The DCNM performance monitoring configuration parameter that must be implemented to achieve the result of triggering events when monitored traffic exceeds the configured percent utilization threshold is the Util% parameter. This parameter allows the administrator to set a utilization threshold as a percentage, which, when exceeded, triggers an event. The requirement to configure a maximum limit of 39860437 bytes directly relates to the statistics collected as a ratio of the total link capacity, which is effectively managed by setting the Util% parameter. This parameter is part of the Performance Manager Configuration Wizard in DCNM, which provides the ability to set up two thresholds that trigger events when the monitored traffic exceeds the percent utilization configured.These thresholds can be set as either Critical or Warning events that are reported on the DCNM-SAN web client Events browser page1.

Total 491 questions
Go to page: of 50