ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 23

Question list
Search
Search

List of questions

Search

Related questions











An engineer must configure RBAC is Cisco UCS Manager in an existing data center environment. Which two roles can be used to configure LAN Connectivity policies? (Choose two.)

A.

network-admin

A.

network-admin

Answers
B.

server-profile

B.

server-profile

Answers
C.

admin

C.

admin

Answers
D.

enable

D.

enable

Answers
E.

operations

E.

operations

Answers
Suggested answer: A, C

Explanation:

In Cisco UCS Manager, RBAC (Role-Based Access Control) is used to define what users can do within the system. The roles that can be used to configure LAN Connectivity policies are typically those with administrative privileges. Thenetwork-adminrole has the necessary privileges to configure network-related settings, including LAN Connectivity policies. Similarly, theadminrole has full administrative rights over all system configuration aspects, which also encompasses LAN Connectivity policies. The other roles listed do not have the appropriate level of access for this task.

An engineer has a primary fabric that is named UCS-A and a secondary fabric that is named UCS-B. A certificate request that has a subject name of sjc2016 for a keyring that is named kr2016 needs to be created. The cluster IP address is 10.68.68.68.

Which command set creates this certificate request?

A.

UCS-A # scope keyring kr2016 UCS-A /keyring # create certreq 10.68.68.68 sjc2016 UCS-A /keyring* # commit-buffer

A.

UCS-A # scope keyring kr2016 UCS-A /keyring # create certreq 10.68.68.68 sjc2016 UCS-A /keyring* # commit-buffer

Answers
B.

UCS-B # scope keyring kr2016 UCS-B /keyring # create certreq ip 10.68.68.68 subject-name sjc2016 UCS-B /keyring* # commit-both

B.

UCS-B # scope keyring kr2016 UCS-B /keyring # create certreq ip 10.68.68.68 subject-name sjc2016 UCS-B /keyring* # commit-both

Answers
C.

UCS-B# scope security UCS-B /security # scope keyring kr2016 UCS-B /security/keyring # set certreq 10.68.68.68 sjc2016 UCS-B /security/keyring* # commit-both

C.

UCS-B# scope security UCS-B /security # scope keyring kr2016 UCS-B /security/keyring # set certreq 10.68.68.68 sjc2016 UCS-B /security/keyring* # commit-both

Answers
D.

UCS-A# scope security UCS-A /security # scope keyring kr2016 UCS-A /security/keyring # create certreq ip 10.68.68.68 subject-name sjc2016 UCS-A /security/keyring* # commit-buffer

D.

UCS-A# scope security UCS-A /security # scope keyring kr2016 UCS-A /security/keyring # create certreq ip 10.68.68.68 subject-name sjc2016 UCS-A /security/keyring* # commit-buffer

Answers
Suggested answer: D

Explanation:

To create a certificate request in Cisco UCS Manager, the correct command set involves navigating to the security scope, selecting the appropriate keyring, and then creating the certificate request with the specified IP address and subject name. The commands in option D correctly follow this procedure. Thecommit-buffercommand is used to commit the changes in UCS-A, which is the primary fabric.

Port security is enabled on a Cisco MDS 9000 series Switch. Which statement is true?

A.

Cisco Fabric Services must be disabled before enabling port security.

A.

Cisco Fabric Services must be disabled before enabling port security.

Answers
B.

Port security can be enabled only globally and affects all VSANs.

B.

Port security can be enabled only globally and affects all VSANs.

Answers
C.

Auto-learning is always enabled automatically when port security is enabled.

C.

Auto-learning is always enabled automatically when port security is enabled.

Answers
D.

Any devices currently logged in must be added manually to the device databased.

D.

Any devices currently logged in must be added manually to the device databased.

Answers
Suggested answer: D

Explanation:

Port security on Cisco MDS 9000 series Switches is a feature that allows administrators to restrict access to the switch ports to specific devices. When port security is enabled, it does not automatically add currently logged-in devices to the device database; they must be added manually. This ensures that only authorized devices can access the network, enhancing the security of the SAN environment.

When a strict CoPP policy is implemented, which statement describes an event during which packets are dropped?

A.

Fifteen SSH sessions remain connected to the switch.

A.

Fifteen SSH sessions remain connected to the switch.

Answers
B.

A large system image is copied to a switch by using the default VRF.

B.

A large system image is copied to a switch by using the default VRF.

Answers
C.

A ping sweep is performed on a network that is connected through a switch.

C.

A ping sweep is performed on a network that is connected through a switch.

Answers
D.

A web server that is connected to a switch is affected by a DDoS attack.

D.

A web server that is connected to a switch is affected by a DDoS attack.

Answers
Suggested answer: C

Explanation:

A strict CoPP (Control Plane Policing) policy is designed to manage the traffic flow of control plane packets to protect the control plane of routers and switches from being overwhelmed by unnecessary or malicious traffic.When a ping sweep, which involves sending ICMP echo requests to multiple hosts to identify live devices on a network, is performed on a network connected through a switch with a strict CoPP policy, excess ICMP packets can be dropped to prevent them from consuming excessive resources.Reference: Cisco Data Center Core Technologies source documents or study guide

Which two authentication types does Cisco UCS Manager support when configuration authentication? (Choose two.)

A.

local

A.

local

Answers
B.

LDAP

B.

LDAP

Answers
C.

802.1X

C.

802.1X

Answers
D.

Kerberos

D.

Kerberos

Answers
E.

PAM

E.

PAM

Answers
Suggested answer: A, B

Explanation:

Cisco UCS Manager supports various types of authentication mechanisms for enhanced security. Option A (local) refers to the use of locally stored user credentials within the UCS Manager for authentication.Option B (LDAP) indicates that UCS Manager can integrate with LDAP (Lightweight Directory Access Protocol) directories for user authentication, allowing centralized management of user credentials.Reference: Cisco Data Center Core Technologies source documents or study guide

Refer to the exhibit.

What is the result of implementing this configuration?

A.

The TACACS+ server uses the type-6 encrypted format.

A.

The TACACS+ server uses the type-6 encrypted format.

Answers
B.

The switch queries the TACACS+ server by using a clear text PAP login.

B.

The switch queries the TACACS+ server by using a clear text PAP login.

Answers
C.

The timeout value on the TACACS+ server is 10 seconds.

C.

The timeout value on the TACACS+ server is 10 seconds.

Answers
D.

The switch queries the TACACS+ server by using an encrypted text PAP login.

D.

The switch queries the TACACS+ server by using an encrypted text PAP login.

Answers
Suggested answer: D

Explanation:

The configuration commands shown in the exhibit set up TACACS+ on a Cisco Nexus device. Thetacacs-server hostcommand with thekeyargument specifies that the switch should use an encrypted key when communicating with the TACACS+ server.Therefore, the switch will query the TACACS+ server using an encrypted text PAP login.Reference: Cisco Data Center Core Technologies source documents or study guide123.

Please note that these answers are based on the information available from the Cisco Data Center Core Technologies resources and the context provided in the questions. For the most accurate and detailed explanations, it's always best to refer directly to the official Cisco documentation and study guides.

Refer to the exhibit.

Which setting must be configured to prevent reuse of passwords?

A.

No Change Interval

A.

No Change Interval

Answers
B.

Change Interval

B.

Change Interval

Answers
C.

History Count

C.

History Count

Answers
D.

Change Count

D.

Change Count

Answers
Suggested answer: C

Explanation:

The History Count setting in a user management system is used to prevent the reuse of old passwords. It specifies the number of unique new passwords that must be used before an old password can be reused. This helps enhance security by ensuring that passwords are not easily guessable and that users are not cycling through a small set of favorite passwords.

An engineer is configuring AAA authentication on an MDS 9000 switch. The LDAP server is located under the IP 10.10.2.2. The data sent to the LDAP server should be encrypted. Which command should be used to meet these requirements?

A.

Idap-server host 10.10.2.2 enable-ssl

A.

Idap-server host 10.10.2.2 enable-ssl

Answers
B.

Idap-server 10.10.2.2 port 443

B.

Idap-server 10.10.2.2 port 443

Answers
C.

Idap server host 10.10.2.2 key SSL_KEY

C.

Idap server host 10.10.2.2 key SSL_KEY

Answers
D.

Idap-server 10.10.2.2 key SSL_KEY

D.

Idap-server 10.10.2.2 key SSL_KEY

Answers
Suggested answer: A

Explanation:

The command ''ldap-server host 10.10.2.2 enable-ssl'' is used to configure AAA authentication on an MDS 9000 switch with an LDAP server located at the IP 10.10.2.2. This command ensures that the data sent to the LDAP server is encrypted using SSL, which is a protocol for securing network communication.

Refer to the exhibit.

Which action is taken to ensure that the relay agent forwards the DHCP BOOTREQUEST packet to a DHCP server?

A.

Configure the interface of the DHCP server as untrusted.

A.

Configure the interface of the DHCP server as untrusted.

Answers
B.

Configure the IP address of the DHCP server.

B.

Configure the IP address of the DHCP server.

Answers
C.

Enable the DHCP relay agent.

C.

Enable the DHCP relay agent.

Answers
D.

Verify the DHCP snooping bindings.

D.

Verify the DHCP snooping bindings.

Answers
Suggested answer: C

Explanation:

Enabling the DHCP relay agent on a switch allows it to forward DHCP BOOTREQUEST packets from clients to a DHCP server, even if they are not on the same physical subnet. This is crucial for clients to obtain an IP address and other network configuration parameters from a DHCP server that is not locally present on the subnet.

A network administrator must perform a system upgrade on a Cisco MDS 9000 Series Switch. Due to the recent changes by the security team:

* The AAA server is unreachable.

* All TCP communication between the MDS 9000 Series Switch and AAA servers is disabled.

Which actions must be used to perform the upgrade?

A.

Log in locally to the MDS 9000 Series Switch using a network-admin role and download the upgrade files from the remote TFTP server.

A.

Log in locally to the MDS 9000 Series Switch using a network-admin role and download the upgrade files from the remote TFTP server.

Answers
B.

Log in locally to the MDS 9000 Series Switch using a server-admin role and download the upgrade files from the remote FTP server.

B.

Log in locally to the MDS 9000 Series Switch using a server-admin role and download the upgrade files from the remote FTP server.

Answers
C.

Log in to a server storing the upgrade files remotely using a server-admin role and download the files to the MDS 9000 Series Switch using SFTP.

C.

Log in to a server storing the upgrade files remotely using a server-admin role and download the files to the MDS 9000 Series Switch using SFTP.

Answers
D.

Log in to a server storing the upgrade files remotely using a network-admin role and download the files to the MDS 9000 Series Switch using HTTP.

D.

Log in to a server storing the upgrade files remotely using a network-admin role and download the files to the MDS 9000 Series Switch using HTTP.

Answers
Suggested answer: A

Explanation:

Since the AAA server is unreachable and TCP communication with the AAA servers is disabled, the network administrator must log in locally using a network-admin role. The upgrade files can then be downloaded from a remote TFTP server, which does not require TCP communication and can operate over UDP, thus bypassing the TCP restriction.

Total 491 questions
Go to page: of 50