ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 16

Question list
Search
Search

Related questions











Which configuration implements static ingress replication?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Static ingress replication is a method used in VXLAN environments where the replication of multicast, broadcast, and unknown unicast traffic is manually defined. In the context of Cisco Data Center Core Technologies, Option A implements static ingress replication by explicitly specifying peers for replication using theingress-replication protocol staticcommand followed by thepeer-ipcommand to define the IP address of the replication peer. This configuration is necessary when multicast routing is not an option in the underlay network.

Refer to the exhibit.

A network engineer is setting up a multihomed OTV network. The first site has been set up with a primary and secondary adjacency server. Which configuration must be added on the remote OTV AEDs site?

A.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563 otv use-adjacency-server 20.1.1.1 unicast-only

A.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563 otv use-adjacency-server 20.1.1.1 unicast-only

Answers
B.

interface Overlay200 otv join-interface Ethernet1/2 otv extand-vlan 178, 2500-2563 otv adjacency-server unicast-only

B.

interface Overlay200 otv join-interface Ethernet1/2 otv extand-vlan 178, 2500-2563 otv adjacency-server unicast-only

Answers
C.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563

C.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563

Answers
D.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563 otv use-adjacency-server 20.1.1.1 20.2.1.1 unicast-only

D.

interface Overlay200 otv join-interface Ethernet1/2 otv extend-vlan 178, 2500-2563 otv use-adjacency-server 20.1.1.1 20.2.1.1 unicast-only

Answers
Suggested answer: D

Explanation:

In a multihomed OTV network, it is essential to configure the remote OTV AEDs (Authoritative Edge Devices) to use both the primary and secondary adjacency servers for redundancy and resiliency. The correct configuration, Option D, includes theotv use-adjacency-servercommand with both IP addresses of the primary and secondary servers followed byunicast-only, which indicates that the AEDs should use unicast connections to the adjacency servers instead of multicast.

A customer has a requirement to deploy a cloud service and needs to have full control over the underlying OS, data and application. Which cloud model meets this requirement?

A.

PaaS

A.

PaaS

Answers
B.

MaaS

B.

MaaS

Answers
C.

IaaS

C.

IaaS

Answers
D.

SaaS

D.

SaaS

Answers
Suggested answer: C

Explanation:

The cloud model that meets the requirement of having full control over the underlying OS, data and application is Infrastructure as a Service (IaaS). IaaS is a cloud service model that provides the customer with access to virtualized computing resources, such as servers, storage, and networks, over the internet. The customer can install, configure, and manage the OS, data, and application of their choice on the rented infrastructure, without having to worry about the maintenance or security of the physical hardware. IaaS offers the customer the highest level of flexibility and control over their cloud environment, compared to other cloud models such as Platform as a Service (PaaS) or Software as a Service (SaaS).Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 8: Data Center Automation and Orchestration, Lesson 8.3: Cisco Cloud Services

Cisco Cloud Computing - IaaS

Refer to the exhibit.

A flapping link issue has been reported on the vPC keepalive link. A packet capture has been activated on the Cisco Nexus switch. What is the destination IP address of the vPC keepalive packets that are sent by the switch?

A.

192.168.254.4

A.

192.168.254.4

Answers
B.

239.255.70.83

B.

239.255.70.83

Answers
C.

192.168.254.1

C.

192.168.254.1

Answers
D.

192.168.254.2

D.

192.168.254.2

Answers
Suggested answer: C

Explanation:

The destination IP address for the vPC keepalive packets sent by the switch is 192.168.254.1. This is indicated in the packet capture output, where ICMP Echo (ping) requests are being sent to this address as part of the keepalive mechanism to ensure the vPC peer link is operational.

Refer to the exhibit.

Which result of running the command is true?

A.

The PIM database is deleted.

A.

The PIM database is deleted.

Answers
B.

Multicast traffic forwarding is suspended.

B.

Multicast traffic forwarding is suspended.

Answers
C.

PIM join messages are suspended.

C.

PIM join messages are suspended.

Answers
D.

MRIB is flushed

D.

MRIB is flushed

Answers
Suggested answer: C

Explanation:

The command in question is likely to temporarily suspend the Protocol Independent Multicast (PIM) join messages. This action does not delete the PIM database or flush the Multicast Routing Information Base (MRIB), nor does it suspend multicast traffic forwarding. Instead, it interrupts the PIM join messages, which are used to build and maintain the multicast distribution tree.

Refer to the exhibit.

What is the reason the system-fm-vrrp checkpoint was created?

A.

The VRRP service restarted and the checkpoint was automatically created.

A.

The VRRP service restarted and the checkpoint was automatically created.

Answers
B.

The network administrator manually created it.

B.

The network administrator manually created it.

Answers
C.

The VRRP process crashed and the checkpoint was automatically created.

C.

The VRRP process crashed and the checkpoint was automatically created.

Answers
D.

The VRRP-enable feature has been disabled.

D.

The VRRP-enable feature has been disabled.

Answers
Suggested answer: B

Explanation:

The checkpoint named ''system-fm-vrrp'' was created by an admin, as indicated by the description ''Created by Feature Manager.'' This suggests that it was a deliberate action rather than an automatic response to a service restart or crash. Checkpoints in Cisco systems can be manually created for various reasons, such as before making significant changes to the configuration, which allows for a rollback to a known good state if necessary.

What are two capabilities of the Cisco Network Assurance Engine? (Choose two.)

A.

It verifies the speed of network packet flows by using telemetry.

A.

It verifies the speed of network packet flows by using telemetry.

Answers
B.

It predicts the network load on a data center.

B.

It predicts the network load on a data center.

Answers
C.

It validates that devices comply with network security policies.

C.

It validates that devices comply with network security policies.

Answers
D.

It ensures that network performance meets an SLA.

D.

It ensures that network performance meets an SLA.

Answers
E.

It predicts the impact of changes to the network.

E.

It predicts the impact of changes to the network.

Answers
Suggested answer: C, E

Explanation:

Two capabilities of the Cisco Network Assurance Engine are that it validates that devices comply with network security policies and that it predicts the impact of changes to the network. The Cisco Network Assurance Engine is a software solution that uses mathematical modeling and verification techniques to continuously analyze the state and configuration of the data center network. It can validate that the network devices are compliant with the intended security policies, such as access control lists, firewall rules, and encryption standards. It can also predict the impact of planned or unplanned changes to the network, such as software upgrades, configuration changes, or device failures, and provide proactive recommendations to avoid or resolve issues. The Cisco Network Assurance Engine helps to ensure that the network is always operating as intended and aligned with the business objectives.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 8: Data Center Automation and Orchestration, Lesson 8.4: Cisco Data Center Network Assurance and Insights

Cisco Network Assurance Engine

What is an advantage of streaming telemetry over SNMP?

A.

on-change traps sent to a receiver

A.

on-change traps sent to a receiver

Answers
B.

periodic push-based subscription messages

B.

periodic push-based subscription messages

Answers
C.

periodic polling of the device status

C.

periodic polling of the device status

Answers
D.

MD5-based authentication on polling

D.

MD5-based authentication on polling

Answers
Suggested answer: B

Explanation:

An advantage of streaming telemetry over SNMP is that it supports periodic push-based subscription messages. Streaming telemetry is a method of collecting and transporting network data from devices to a receiver, such as a collector or a dashboard. Streaming telemetry allows the devices to send data periodically or on-demand, based on a subscription model. The receiver can subscribe to specific data sets or events that it is interested in, and the device will push the data to the receiver as it becomes available. This reduces the overhead and latency of polling the device status using SNMP, and provides more granular and real-time visibility into the network state and performance.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 8: Data Center Automation and Orchestration, Lesson 8.2: Cisco NX-OS Programmability

Cisco Nexus 9000 Series NX-OS Programmability Guide, Release 9.3(x), Chapter: Configuring Streaming Telemetry

Refer to the exhibit.

All switches are configured with the default OSPF priority. Which configuration should be applied to ensure that the SW2 Cisco Nexus switch controls the LSA floods and advertises the network to the remaining nodes in the OSPFv2 area?

A.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 255

A.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 255

Answers
B.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 1

B.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 1

Answers
C.

SW2# configure terminal SW2 (config)# router ospf 1 SW2 (config-router)# router-id 10.10.10.22

C.

SW2# configure terminal SW2 (config)# router ospf 1 SW2 (config-router)# router-id 10.10.10.22

Answers
D.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 0

D.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 0

Answers
Suggested answer: A

Explanation:

In OSPF, the router with the highest priority on a network becomes the Designated Router (DR), responsible for generating LSAs for the network. By default, all Cisco routers have an OSPF priority of 1. To ensure that SW2 becomes the DR and controls the LSA floods, its priority needs to be the highest in the OSPFv2 area. The command in option A sets the OSPF priority to the maximum value of 255, which will make SW2 the most likely candidate to be elected as the DR, provided that no other router has a higher priority or a higher router ID if priorities are equal.

Which MAC address is an HSRP version 2?

A.

0100.5E7F.FFFF

A.

0100.5E7F.FFFF

Answers
B.

3799.9943 3000

B.

3799.9943 3000

Answers
C.

0000.0C9F.F0C8

C.

0000.0C9F.F0C8

Answers
D.

0000.OC07.AC1H

D.

0000.OC07.AC1H

Answers
Suggested answer: C

Explanation:

The MAC address that is an HSRP version 2 address is 0000.0C9F.F0C8. HSRP (Hot Standby Router Protocol) is a protocol that provides redundancy and load balancing for IP networks by allowing multiple routers to share a virtual IP address and MAC address. HSRP version 2 supports up to 4096 groups, and uses a different MAC address format than HSRP version 1. The MAC address format for HSRP version 2 is 0000.0C9F.FXXX, where XXX is the hexadecimal value of the group number. For group 200, the hexadecimal value is C8, so the MAC address is 0000.0C9F.F0C8.Reference:=

Implementing and Operating Cisco Data Center Core Technologies (DCCOR) v1.2, Module 3: Data Center LAN Network Connectivity, Lesson 3.6: Cisco Nexus 5000 Series Switches

Cisco Nexus 5000 Series NX-OS Unicast Routing Configuration Guide, Release 5.2(1)N1(1), Chapter: Configuring HSRP, Section: HSRP Version 2

Total 491 questions
Go to page: of 50