ExamGecko
Home / Cisco / 350-601 / List of questions
Ask Question

Cisco 350-601 Practice Test - Questions Answers, Page 13

List of questions

Question 121

Report Export Collapse

Refer to the exhibit. An engineer needs to implement streaming telemetry on a cisco MDS 9000 series switch. The requirement is for the show command data to be collected every 30 seconds and sent to receivers. Which command must be added to the configuration meet this requirement?

Sensor-grp 200 sample-period 30000

Sensor-grp 200 sample-period 30000

Snsr-grp 200 sample-interval 30

Snsr-grp 200 sample-interval 30

Sensor-grp 200 sample-period 30

Sensor-grp 200 sample-period 30

Snsr-grp 200 sample-interval 30000

Snsr-grp 200 sample-interval 30000

Suggested answer: D
Explanation:

To meet the requirement of collecting show command data every 30 seconds and sending it to receivers, the command must specify the sample interval in milliseconds. Therefore, the correct command isSnsr-grp 200 sample-interval 30000, which sets the sample interval to 30,000 milliseconds (equivalent to 30 seconds).

asked 10/10/2024
Pichai Chaipoon
47 questions

Question 122

Report Export Collapse

A cisco Nexus 9000 series switch experiences a startup configuration comuption. The engineer must implement a procedure to recover configuration file from the switch. Which command set must be used?

1. Copy the running-configuration to the startup configuration. 2. Clear the current configuration of the switch. 3. Restart the device. 4. Copy a previously saved configuration file to the running configuration.

1. Copy the running-configuration to the startup configuration. 2. Clear the current configuration of the switch. 3. Restart the device. 4. Copy a previously saved configuration file to the running configuration.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy the running configuration to the startup configuration 4. Copy a previously saved configuration file to the running configuration

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy the running configuration to the startup configuration 4. Copy a previously saved configuration file to the running configuration

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy a previously saved configuration file to the running-configuration 4. Copy the running-configuration to the startup configuration.

1. Clear the current configuration of the switch 2. Restart the device. 3. Copy a previously saved configuration file to the running-configuration 4. Copy the running-configuration to the startup configuration.

1.Restarting device. 2. Copy the running-configuration file to a remote server. 3. Clear the current configuration of the switch. 4. Copy the running configuration to the startup configuration

1.Restarting device. 2. Copy the running-configuration file to a remote server. 3. Clear the current configuration of the switch. 4. Copy the running configuration to the startup configuration

Suggested answer: C
Explanation:

When a Cisco Nexus 9000 series switch encounters a startup configuration corruption, the recovery process involves clearing the current configuration, restarting the device, and then restoring the configuration from a previously saved file. The correct sequence is to first clear the configuration to prevent the corrupted startup configuration from loading upon restart. After restarting the device, the previously saved configuration file should be copied to the running configuration. Finally, to ensure the switch starts with the correct configuration in future restarts, the running configuration should be saved to the startup configuration.

asked 10/10/2024
Arti Karangiya
37 questions

Question 123

Report Export Collapse

An engineer must configure OSPF in the data center. The external routes have already been redistributed OSPF. The network must meet these criteria:

* The data centre servers must reach services in the cloud and the services behind the redistributed routes.

* The exit point toward the internet should be propagated only when there is a dynamically learned default route from the upstream router.

Which feature is required?

Default-information originate

Default-information originate

Stubby area

Stubby area

Totally stubby area

Totally stubby area

Default-information originate always

Default-information originate always

Suggested answer: A
Explanation:

The requirement for the data center servers to reach services in the cloud and services behind redistributed routes, along with the condition that the exit point toward the internet should only be propagated when there is a dynamically learned default route, necessitates the use of the 'default-information originate' OSPF feature. This feature allows the advertisement of the default route in OSPF when it is present in the routing table, which is the case when it is dynamically learned from the upstream router.

https://learningnetwork.cisco.com/s/question/0D53i00000Kt544/defaultinformationoriginate-always

asked 10/10/2024
Bruce Baynes
30 questions

Question 124

Report Export Collapse

What is a characteristic of the install all command on the cisco Nexus series switch?

Upgrades only certain modules

Upgrades only certain modules

Automatically checks the image integrity

Automatically checks the image integrity

Impact data plan traffic

Impact data plan traffic

Continues the upgrade process if any step in the sequence fails

Continues the upgrade process if any step in the sequence fails

Suggested answer: B
Explanation:

A characteristic of the install all command on the Cisco Nexus series switch is that it automatically checks the image integrity before performing the installation. The install all command is used to install a system image and kickstart image on the switch, as well as to upgrade the BIOS and other firmware components. The install all command performs a series of checks and validations before installing the images, such as verifying the compatibility, checksum, and signature of the images. This ensures that the images are not corrupted or tampered with, and that they match the hardware and software requirements of the switch. The install all command also performs a backup of the current configuration and images, and allows the user to abort the installation process if needed.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 3: Data Center LAN Network Connectivity, Lesson 3.4: Cisco Nexus 9000 Series Switches

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x), Chapter: Installing Software Images and EPLDs, Section: Installing System and Kickstart Images

asked 10/10/2024
Kazi Basit
45 questions

Question 125

Report Export Collapse

An engineer is using REST API calls to configure the cisco APIC. Which data structure must be used within a post message to receive a login token?

A)

Cisco 350-601 image Question 125 116855 10102024233033000000

B)

Cisco 350-601 image Question 125 116855 10102024233033000000

C)

Cisco 350-601 image Question 125 116855 10102024233033000000

D)

Cisco 350-601 image Question 125 116855 10102024233033000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: A
Explanation:

The correct data structure to use within a POST message to receive a login token when configuring the Cisco APIC via REST API calls is an XML payload that includes thetags with nested<name>andtags for the username and password. This structure is shown in Option A, which is the standard format for authentication requests to the Cisco APIC.

asked 10/10/2024
Wissam Aoun
44 questions

Question 126

Report Export Collapse

The EPLD update of the supervisor module has been scheduled for several cisco MDS 9000 switches. What will be the impact of the update?

All control plane traffic is stopped for the duration of the EPLD update and the switch remain operational for the duration of the upgrade.

All control plane traffic is stopped for the duration of the EPLD update and the switch remain operational for the duration of the upgrade.

The redundant supervisor lakes over while the EPLD update is in progress and there is no service disruption.

The redundant supervisor lakes over while the EPLD update is in progress and there is no service disruption.

All traffic is stopped for the duration of the EPLD update and the switch is rebooted after the upgrade is completed.

All traffic is stopped for the duration of the EPLD update and the switch is rebooted after the upgrade is completed.

The redundant supervisor lakes while the EPLD update is in progress and the switch is rebooted after the upgrade is completed.

The redundant supervisor lakes while the EPLD update is in progress and the switch is rebooted after the upgrade is completed.

Suggested answer: B
Explanation:

The impact of the EPLD update of the supervisor module on the Cisco MDS 9000 switches is that the redundant supervisor takes over while the EPLD update is in progress and there is no service disruption. EPLD (Electronic Programmable Logic Device) is a firmware component that controls the functionality of various hardware modules on the switch, such as the supervisor, line cards, and fabric modules. The EPLD update is performed to enhance the performance and features of the hardware modules, and to fix any bugs or issues. The EPLD update process requires a reload of the affected module, which can cause a temporary loss of connectivity and traffic. However, if the switch has a redundant supervisor module configured in high availability mode, the EPLD update can be performed without any service disruption. This is because the redundant supervisor takes over the control plane functions while the active supervisor is being updated, and then switches back to the active supervisor when the update is completed. The EPLD update does not affect the data plane traffic, as the line cards and fabric modules continue to forward packets during the update process.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 7: Data Center Storage Connectivity, Lesson 7.3: Fibre Channel Protocol

Cisco MDS 9000 Family NX-OS System Management Configuration Guide, Chapter: Installing Software Images and EPLDs, Section: Updating EPLDs

asked 10/10/2024
Najim Abdelmoula
50 questions

Question 127

Report Export Collapse

An engineer configures an intersignt virtual application and must claim over 200 targets. The engineer starts the Claim target procedure. The engineer has prepared this initial comma- separated value file to provision the targets:

Cisco 350-601 image Question 127 116857 10102024233033000000

Which Information must be included In the comma-separated value flit to provision the targets?

FQON, AD name, IP address, email

FQON, AD name, IP address, email

location, address, name. password

location, address, name. password

certificate, user name, password. email

certificate, user name, password. email

target type, hostname or P address, user name, password

target type, hostname or P address, user name, password

Suggested answer: D
Explanation:

When configuring an Intersight virtual application and claiming targets, the information required in the comma-separated value (CSV) file for provisioning includes the target type, hostname or IP address, user name, and password. This set of information is necessary to uniquely identify and authenticate each target for the claim process.

asked 10/10/2024
John Murphy
34 questions

Question 128

Report Export Collapse

What is an advantage of NFSv4 over Fibre Channel protocol?

Improved security

Improved security

Lossless throughout

Lossless throughout

Congestion management

Congestion management

Uses IP transport

Uses IP transport

Suggested answer: A
Explanation:

NFSv4 offers several advantages over Fibre Channel protocol, one of which is improved security. NFSv4 is designed to be more secure than its predecessors, providing strong security features that are not inherent in Fibre Channel. It includes mechanisms for authentication, integrity, and privacy, which are part of its standard protocol suite. NFSv4 also integrates well with security infrastructures like Kerberos, allowing for secure, authenticated access to file systems over a network.

asked 10/10/2024
Jaques Rautenbach
40 questions

Question 129

Report Export Collapse

Which two configuration settings are available in the in the cisco UCS flmware Auto sync server policy?

User Notification

User Notification

User Acknowledge

User Acknowledge

No Action

No Action

Delayed Action

Delayed Action

Immediate Action

Immediate Action

Suggested answer: B, C
Explanation:

The Cisco UCS firmware Auto Sync Server policy includes several configuration settings that determine how and when firmware on servers is synchronized. The two available settings from the options provided are 'User Acknowledge' and 'No Action'. 'User Acknowledge' requires an administrator to manually acknowledge firmware upgrades in the Pending Activities dialog box before they are applied. 'No Action' means no firmware upgrade is initiated on the server. These settings allow administrators to control the firmware synchronization process according to their operational policies and procedures.

asked 10/10/2024
Miguel Villanueva
35 questions

Question 130

Report Export Collapse

An administrator is implementing DCNM so that events are triggered when monitored traffic exceeds the configured present utili zation threshold. The requirement is to configuration a maximum limit of 39860437 bytes that applies directly to the statistics collected as a ratio of the total link capacity. Which DCNM performance monitoring configuration parameter must be implemented to achieve this result?

Absolution Values

Absolution Values

Baseline

Baseline

Utill%

Utill%

Per port Monitoring

Per port Monitoring

Suggested answer: C
Explanation:

The DCNM performance monitoring configuration parameter that must be implemented to achieve the result of triggering events when monitored traffic exceeds the configured percent utilization threshold is the Util% parameter. This parameter allows the administrator to set a utilization threshold as a percentage, which, when exceeded, triggers an event. The requirement to configure a maximum limit of 39860437 bytes directly relates to the statistics collected as a ratio of the total link capacity, which is effectively managed by setting the Util% parameter. This parameter is part of the Performance Manager Configuration Wizard in DCNM, which provides the ability to set up two thresholds that trigger events when the monitored traffic exceeds the percent utilization configured.These thresholds can be set as either Critical or Warning events that are reported on the DCNM-SAN web client Events browser page1.

asked 10/10/2024
Mpho Ntshontsi
48 questions
Total 491 questions
Go to page: of 50
Search

Related questions