ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 14

Question list
Search
Search

List of questions

Search

Related questions











A network architect must redesign a data center on OSPFv2. The network must perform fast reconvergence between directly connected switches. Which two actions must be taken to meet the requirement? (Choose two)

A.

Configure all links on AREA 0.

A.

Configure all links on AREA 0.

Answers
B.

Implement a virtual link between the switches.

B.

Implement a virtual link between the switches.

Answers
C.

Use OSPF point-to-point links only.

C.

Use OSPF point-to-point links only.

Answers
D.

Set low OSPF hello and DEAD timers.

D.

Set low OSPF hello and DEAD timers.

Answers
E.

Enable BFD for failure detection.

E.

Enable BFD for failure detection.

Answers
Suggested answer: D, E

Explanation:

To achieve fast reconvergence between directly connected switches in a data center using OSPFv2, two critical actions must be taken. First, setting low OSPF hello and DEAD timers can significantly reduce the time it takes for OSPF to detect a link failure and start the reconvergence process. This is because OSPF hello packets are used to maintain neighbor relationships, and the DEAD timer determines how long a router will wait without receiving a hello packet before declaring the neighbor down. By reducing these timers, OSPF can detect failures more quickly and initiate a faster reconvergence.

Second, enabling Bidirectional Forwarding Detection (BFD) for failure detection is essential. BFD is a network protocol that provides fast failure detection times for all media types, encapsulations, topologies, and routing protocols.By implementing BFD, OSPF can be notified of link failures almost immediately, allowing for a rapid response to changes in the network topology and ensuring minimal disruption to data flows2.

Refer to the exhibit.

Refer to the exhibit. A host with source address 10.10.10.10. sends traffic to multicast group 239.1.1.1. how do the vPC switches forward the multicast traffic?

A.

If multicast traffic is received on Po11 Switch2, the traffic is forwarded out only one Po20.

A.

If multicast traffic is received on Po11 Switch2, the traffic is forwarded out only one Po20.

Answers
B.

If multicast traffic is received on Po10 Switch1, the traffic is forwarded out on Po1 and Po20.

B.

If multicast traffic is received on Po10 Switch1, the traffic is forwarded out on Po1 and Po20.

Answers
C.

If multicast traffic is received on Po11 and Switch2, the traffic is dropped.

C.

If multicast traffic is received on Po11 and Switch2, the traffic is dropped.

Answers
D.

If multicast traffic is received on Switch over the vPC peer-link, the traffic is dropped.

D.

If multicast traffic is received on Switch over the vPC peer-link, the traffic is dropped.

Answers
Suggested answer: B

Explanation:

In a vPC (Virtual Port Channel) configuration, multicast traffic is handled based on the IGMP (Internet Group Management Protocol) and PIM (Protocol Independent Multicast) configurations. When a host sends traffic to a multicast group, the vPC switches determine the forwarding path based on the multicast routing table and the RPF (Reverse Path Forwarding) check.

Option B is correct because when multicast traffic with source address 10.10.10.10 targeting group 239.1.1.1 is received on Po10 Switch1, the switch will perform an RPF check and forward the traffic out of the interfaces that lead to the Rendezvous Point (RP) and the receivers. This ensures that the multicast traffic is efficiently distributed to all receivers that are part of the multicast group. The traffic would be forwarded out on Po1, which is typically connected to the RP, and Po20, which connects to other receivers in the network.

An engineer configured an environment that contains the vPC and non-vPC switches. However, it was noticed that the downstream non-vPC switches do not receive the upstream vPC switch peers. Which vPC feature must be implement to ensure that vPC and non-vPC switches receive same STP bridge ID from the upstream vPC switch peers?

A.

vpc local role-priority 4000

A.

vpc local role-priority 4000

Answers
B.

peer-switch

B.

peer-switch

Answers
C.

system-mac 0123.4567.89ab

C.

system-mac 0123.4567.89ab

Answers
D.

peer-gateway

D.

peer-gateway

Answers
Suggested answer: B

Explanation:

To ensure that vPC and non-vPC switches receive the same STP bridge ID from the upstream vPC switch peers, the engineer must implement the peer-switch feature on the vPC domain. The peer-switch feature allows the two vPC peer switches to act as a single logical switch for STP purposes, and to use the same bridge ID and priority. This way, the downstream switches will see the vPC peer switches as a single STP root, and will not have any STP loops or inconsistencies. The peer-switch feature also improves the convergence time and reduces the number of STP instances required in the network.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 3: Data Center LAN Network Connectivity, Lesson 3.5: Cisco Nexus 7000 Series Switches

Cisco Nexus 7000 Series NX-OS Interfaces Configuration Guide, Release 6.x, Chapter: Configuring vPCs, Section: Configuring the Peer Switch Feature

A company is running a pair of cisco Nexus 7706 series switches as part of a data center segment. All network engineers have restricted read-Write access to the core switches. A network engineer must a new FCoE VLAN to allow traffic from services toward FCoE storage. Which set of actions must be taken to meet these requirements?

A.

1. Create a user defined role and add the required privileges. 2. Assign a role to a user.

A.

1. Create a user defined role and add the required privileges. 2. Assign a role to a user.

Answers
B.

1. Add the required privilege to the VDC-admin role.

B.

1. Add the required privilege to the VDC-admin role.

Answers
C.

Commit the changes to the active user database.

C.

Commit the changes to the active user database.

Answers
D.

1. Modify a network-operator role and add the required privileges. 2. Assign a VDC-operator role to a user.

D.

1. Modify a network-operator role and add the required privileges. 2. Assign a VDC-operator role to a user.

Answers
E.

1. Assign the network-admin role to a user. 2. Commit the role to the switch to the active user database

E.

1. Assign the network-admin role to a user. 2. Commit the role to the switch to the active user database

Answers
Suggested answer: A

Explanation:

Create a user defined role and add the required privileges.

Assign a role to a user.Comprehensive and Detailed Explanation: = To meet the requirements of adding a new FCoE VLAN to the core switches with restricted read-write access, the network engineer must create a user defined role and assign it to a user. A user defined role is a custom role that can be created to grant specific privileges and permissions to a user, based on the tasks and functions they need to perform. A user defined role can be created using the role command, and then the required privileges can be added using the rule command. For example, to create a role named FCoE-admin and add the privilege to configure FCoE VLANs, the following commands can be used:

role FCoE-admin rule 1 permit read-write feature fcoe rule 2 permit read-write feature vlan

After creating the user defined role, it can be assigned to a user using the username command. For example, to assign the FCoE-admin role to a user named John, the following command can be used:

username John role FCoE-admin

By creating and assigning a user defined role, the network engineer can ensure that the user has the minimum required privileges to perform the FCoE VLAN configuration, without granting them full network-admin access or modifying the existing roles.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 3: Data Center LAN Network Connectivity, Lesson 3.5: Cisco Nexus 7000 Series Switches

Cisco Nexus 7000 Series NX-OS Security Configuration Guide, Release 6.x, Chapter: Configuring User Accounts and RBAC, Section: Configuring User-Defined Roles

Refer to the exhibit.

Refer to the exhibit. Esxi-server is associated to the blade server. A VLAN added to trunk-a. the VLAN is missing on the vNIC of ESXI-server. Which action should be taken to add the VLAN to the cNIC?

A.

Change the template type of ESXI-Server to an updating template.

A.

Change the template type of ESXI-Server to an updating template.

Answers
B.

Change the template type of Trunk-A to an updating template.

B.

Change the template type of Trunk-A to an updating template.

Answers
C.

Remove both template and recreate them as updating templates.

C.

Remove both template and recreate them as updating templates.

Answers
D.

Remove the VLAN from the Trunk-A template and add the VLAN again.

D.

Remove the VLAN from the Trunk-A template and add the VLAN again.

Answers
Suggested answer: B

Explanation:

When a VLAN is added to a trunk and it does not appear on the vNIC of an associated server, it typically indicates that the vNIC template is not updating as it should to reflect changes. By changing the template type of Trunk-A to an updating template, any changes made to the trunk configuration, such as adding a new VLAN, will be dynamically applied to all vNICs associated with that template. This action will allow the newly added VLAN to be included in the vNIC configuration without the need to manually update each vNIC or recreate the templates.

An engineer must implement an automation solution to allow the backup of the configuration of cisco Nexus series switches to a centralized location. The solution must:

* Support the team-developed custom monitoring scripts that are packaged using RPM packaging that the framework must support.

* Be developed from the underlying cisco Nexus operating system.

* Have no impact on the operating system of the underlying switch if the resource contention occurs.

* Use Python to expand the existing automation framework.

Which solution meets these requirements?

A.

Guest Shell

A.

Guest Shell

Answers
B.

Bash Shell

B.

Bash Shell

Answers
C.

TCL Shell

C.

TCL Shell

Answers
D.

Vegas Shell

D.

Vegas Shell

Answers
Suggested answer: A

Explanation:

The solution that meets the requirements for implementing an automation solution to allow the backup of the configuration of Cisco Nexus series switches to a centralized location is the Guest Shell. The Guest Shell is a Linux-based container that runs on the Cisco Nexus operating system and provides a secure environment for running Python scripts and custom applications. The Guest Shell supports the RPM packaging format, which allows the team-developed custom monitoring scripts to be easily installed and managed. The Guest Shell is isolated from the underlying Cisco Nexus operating system, which means that it has no impact on the operating system if the resource contention occurs. The Guest Shell also allows the use of Python to expand the existing automation framework, such as using the NX-API or the Cisco Nexus Python SDK to interact with the switch configuration and state.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 8: Data Center Automation and Orchestration, Lesson 8.2: Cisco NX-OS Programmability

Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 9.3(x), Chapter: Using Guest Shell

Refer to the exhibit.

Refer to the exhibit. What is the result of executing this python code?

A.

It backs up Cisco switches to Cisco Prime infrastructure.

A.

It backs up Cisco switches to Cisco Prime infrastructure.

Answers
B.

It sends the switch configuration to Cisco TAC.

B.

It sends the switch configuration to Cisco TAC.

Answers
C.

It sends a Cisco device backup to a remote destination.

C.

It sends a Cisco device backup to a remote destination.

Answers
D.

It schedules a backup on a Cisco switch using EEM.

D.

It schedules a backup on a Cisco switch using EEM.

Answers
Suggested answer: C

Refer to the exhibit.

Refer to the exhibit. An engineer must monitor ingress traffic from SW1 and SW2 port-channel interfaces from SW3. Which configuration must be implemented to accomplish this goal? A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Explanation:

To monitor ingress traffic from SW1 and SW2 port-channel interfaces from SW3, the engineer must implement a configuration that specifies the source interfaces for monitoring and the destination interface where the monitored traffic will be sent. The correct configuration is found in Option D, which includes the commands to create a monitor session, specify the source interfaces as port-channel 1 and port-channel 2 with the 'rx' option to indicate ingress traffic, and set the destination interface to Ethernet 1/4 where the traffic can be analyzed. This setup uses a Switched Port Analyzer (SPAN) or Remote SPAN (RSPAN) to capture and forward the traffic for monitoring purposes.

An engineer implements an ACI fabric and must implement microsegmentation of endpoints within the same IP subnet using a network-based attribute. The attribute mapping must allow IP subnet independence. Which attribute must be selected?

A.

MAC address

A.

MAC address

Answers
B.

Custom

B.

Custom

Answers
C.

Tag

C.

Tag

Answers
D.

IP

D.

IP

Answers
Suggested answer: C

Explanation:

The attribute that must be selected to implement microsegmentation of endpoints within the same IP subnet using a network-based attribute that allows IP subnet independence is the Tag attribute. The Tag attribute is a user-defined attribute that can be assigned to endpoints based on any criteria, such as location, function, or security level. The Tag attribute can be used to create microsegmentation policies in ACI, which define the rules for communication between endpoints within the same or different bridge domains. The Tag attribute enables IP subnet independence, which means that the microsegmentation policies are not tied to the IP subnet of the endpoints, and can be applied across different subnets or even different fabrics. The Tag attribute also simplifies the management and scalability of microsegmentation policies, as it does not require the use of IP addresses or MAC addresses to identify endpoints.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 6: Data Center Network Connectivity Design, Lesson 6.2: Cisco ACI Overview and Concepts

Cisco Application Centric Infrastructure Fundamentals, Chapter: Endpoint Groups and Microsegmentation, Section: Microsegmentation Using Tags

An engineer is configuring a vHBA template in Cisco UCS Manager. The engineer needs to specify the logical addresses used by the vHBA and the path through which the SAU Traffic flows. Which two resources must be specified in the vHBA template? (Choose two)

A.

WWIN

A.

WWIN

Answers
B.

VLAN ID

B.

VLAN ID

Answers
C.

Fabric ID

C.

Fabric ID

Answers
D.

MAC addresses

D.

MAC addresses

Answers
E.

WWVPN Pool

E.

WWVPN Pool

Answers
Suggested answer: A, C

Explanation:

When configuring a vHBA template in Cisco UCS Manager, the engineer needs to specify the logical addresses used by the vHBA and the path through which the SAN traffic flows. The two resources that must be specified in the vHBA template are the WWN (World Wide Name) and the Fabric ID. The WWN is a unique identifier for the vHBA that is used for zoning and LUN masking in the SAN environment. The WWN can be assigned manually or automatically from a WWN pool. The Fabric ID is a parameter that determines which fabric interconnect (A or B) the vHBA is associated with. The Fabric ID can be set to a specific value or to 'default', which allows the system to choose the best available fabric interconnect based on the availability and load balancing policies.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 5: Cisco Unified Computing System, Lesson 5.2: Cisco UCS B-Series Connectivity

Cisco UCS Manager GUI Configuration Guide, Release 4.0, Chapter: Configuring SAN Connectivity, Section: Creating vHBA Templates

Total 491 questions
Go to page: of 50