ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 24

Question list
Search
Search

List of questions

Search

Related questions











An engineer must implement a VXLAN-based data center interconnect. The long-distance transport provided by a service provider is IP-based,supports a maximum MTU of 1554 bytes, and does not support outbound traffic replication. Which action must be take to build the data center interconnect?

A.

Configure a route map to associate the IPs of the remote VTEPs.

A.

Configure a route map to associate the IPs of the remote VTEPs.

Answers
B.

Create an IP access list and associate it with VNI to replicate traffic to remote VTEPs.

B.

Create an IP access list and associate it with VNI to replicate traffic to remote VTEPs.

Answers
C.

Announce host reachability over BGP.

C.

Announce host reachability over BGP.

Answers
D.

Implement BGP EVPN ingress replication.

D.

Implement BGP EVPN ingress replication.

Answers
Suggested answer: C

Explanation:

In a VXLAN-based data center interconnect scenario where the transport supports a maximum MTU of 1554 bytes and does not support outbound traffic replication, the engineer must use BGP to announce host reachability. This allows for the advertisement of host routes over the BGP session, enabling remote VTEPs to learn about hosts in the interconnected data centers without relying on traffic replication.

An engineer is performing a configuration on a Cisco Nexus 5000 Series Switch. The requirement is for the current Fibre Channel IDs in VSAN 120 to be saved across reboots. The Cisco environment also must integrate with a third-party solution that requires persistent Fibre Channel IDs for the VSAN The WWN of the Cisco switch must be 33:*8:00:05:30:00:16:df and its Fibre Channel ID 0x070128 Which command set meets these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The correct command set is Option C, which includes the commandfcdomain fcid persistent vsan 120. This command ensures that the Fibre Channel IDs (fcid) are saved across reboots for VSAN 120, meeting the requirement for persistent Fibre Channel IDs. The other commands in Option C are used to set the WWN and fcid as per the given requirements.

Refer to the exhibit.

Refer to the exhibit. What happens to the broadcast traffic when it reaches aggregation switches?

A.

Only Agg-1 switch receives broadcast packets and does not forward to the peer link on Agg-2 switch.

A.

Only Agg-1 switch receives broadcast packets and does not forward to the peer link on Agg-2 switch.

Answers
B.

Agg-1 switch prevents broadcast packets received on the vPC peer link from exiting the switch on ports Eth2M and Eth2/5

B.

Agg-1 switch prevents broadcast packets received on the vPC peer link from exiting the switch on ports Eth2M and Eth2/5

Answers
C.

Agg-2 switch receives broadcast packets and stops forwarding to the peer link on Agg-1 switch.

C.

Agg-2 switch receives broadcast packets and stops forwarding to the peer link on Agg-1 switch.

Answers
D.

Agg1 and Agg2 switches receive broadcast packets and does not forward them to me peer link or the port channel

D.

Agg1 and Agg2 switches receive broadcast packets and does not forward them to me peer link or the port channel

Answers
Suggested answer: B

Explanation:

In a vPC (Virtual Port Channel) environment, broadcast packets received on the vPC peer link are not forwarded out on the vPC member ports. This behavior is due to the vPC loop avoidance rule, which prevents traffic received on a vPC peer link from being sent back out of the vPC member ports. Therefore, the Agg-1 switch will prevent broadcast packets that arrive on the vPC peer link from exiting the switch on ports Eth2/4 and Eth2/5.

The VMM domain is integrated between Cisco APICs and vCenter using a distributed vSwitch. The traffic must be blocked between a subset of endpoints in an EPG based on specific VM attributes and the rest of the VMs in that EPG. Which set of actions blocks this traffic?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To block traffic between a subset of endpoints in an EPG based on specific VM attributes and the rest of the VMs in that EPG, the correct set of actions would involve setting ''Allow Microsegmentation'' under the EPG VMM Domain Association to ''True'' and setting ''Intra-EPG Isolation'' to ''Enforced'' for both the EPG and the uSeg EPG. This configuration ensures that microsegmentation is allowed and that intra-EPG isolation is enforced, effectively blocking the specified traffic.

The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course provides insights into the implementation of data center technologies, including network, compute, storage network, automation, and security1.

The Cisco Community articles on VMM Integration & Troubleshooting and ACI VMM integration provide practical guidance and troubleshooting tips for integrating VMM domains with Cisco ACI23.

For detailed procedures and additional information, the configuration guides and training materials available on Cisco's official website are valuable resources

An engineer must configure OSPFv2 connectivity between a pair of Cisco Nexus switches. The connection between the switches must meet these requirements:

Use unicast for updates.

Use decentralized communication of updates.

Full adjacency between switches.

Which configuration is needed to meet these requirements?

A.

interface with a type of p2p network

A.

interface with a type of p2p network

Answers
B.

stub area between the neighbors

B.

stub area between the neighbors

Answers
C.

filter list between the neighbors

C.

filter list between the neighbors

Answers
D.

virtual link between the neighbors

D.

virtual link between the neighbors

Answers
Suggested answer: A

Explanation:

OSPFv2 can be configured for unicast updates and decentralized communication through a point-to-point (p2p) network type on the interface connecting the Cisco Nexus switches.This configuration ensures that OSPFv2 updates are sent directly between the two switches without the need for a designated router, meeting all listed requirements including full adjacency1.

Refer to the exhibit.

Refer to the exhibit. An engineer must schedule the firmware upgrade of the Red1 and Red2 leaf switches. The requirement is to keep the upgrade time to the minimum, avoid any service impact, and perform the parallel upgrade Which set of scheduler attributes must be used to meet these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

To schedule the firmware upgrade of the Red1 and Red2 leaf switches with the requirements of minimal upgrade time, no service impact, and parallel upgrade, SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 2 should be used. This allows both Red1 and Red2 to upgrade simultaneously within the same maintenance window, thus minimizing the time and avoiding any service disruption.

An engineer must perform a backup operation of the Cisco UCS system. The backup must be transferred to a secure location using UDP and must contain information about VLANs, VSANs, and other policies. Also, the operations team requires the backup file to be in a human-readable format. Which configuration set meets these requirements?

A.

Type: System configuration Protocol: SCP

A.

Type: System configuration Protocol: SCP

Answers
B.

Type: Logical configuration Protocol: TFTP

B.

Type: Logical configuration Protocol: TFTP

Answers
C.

Type: All configuration Protocol: FTP

C.

Type: All configuration Protocol: FTP

Answers
D.

Type: Full state Protocol: SFTP

D.

Type: Full state Protocol: SFTP

Answers
Suggested answer: B

Explanation:

This type of backup includes information about VLANs, VSANs, and other policies and is in XML format, which is human-readable.Although the question specifies the use of UDP, none of the options provided use UDP as they are all TCP-based protocols; however, TFTP is often confused with being UDP-based because it is a lightweight protoco

Refer to the exhibit.

Refer to the exhibit. An engineer must configure FCoE between the N9K-A switch and the FCF-A Nexus 9000 core switch. The deployment has these characteristics:

The N9K-Aand N9K-B top-of-rack switches share the domain ID of the core switches.

The hosts are equipped with converged network adapters.

The only VSAN that is permitted to traverse port-channel 100 is VSAN 20.

Which configuration completes the FCoE configuration on the N9K-A device?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Explanation:

to configure FCoE between the N9K-A switch and the FCF-A Nexus 9000 core switch with the given characteristics, the correct configuration would be the one that enables FCoE NPV mode, binds the interface to a port-channel, and allows only VSAN 20 on the trunk.Based on the provided CLI configurations, the correct answer would beOption Das it configures the switch in NPV mode and allows only VSAN 20

A customer undergoes an IT security review assessment. The auditor must have read-only access to the Cisco Nexus 9000 Series Switch to perform the configuration review. The customer implements this security role for the auditor:

role name audit

rule 1 permit command *

rule 2 - Output omitted -

username auditor password C4SAFF0B96EB0045$c0 role audit

Which configuration snippet must complete the configuration?

A.

deny command write*

A.

deny command write*

Answers
B.

permit command enable

B.

permit command enable

Answers
C.

permit command show *

C.

permit command show *

Answers
D.

deny command configure terminal

D.

deny command configure terminal

Answers
Suggested answer: C

Explanation:

The auditor requires read-only access to perform the configuration review. Thepermit command show *grants the auditor access to allshowcommands, which are typically used to view configurations and statuses without making changes, thus maintaining the read-only requirement.Reference: This is aligned with the best practices for role-based access control (RBAC) in Cisco Nexus switches, as detailed in the DCCOR course materials.

A Cisco ACI engineer must configure an access port on a Cisco ACI leaf switch. The access policy should be configured so that it supports L30ut connectivity concurrently with several EPGs that are mapped to this interface with the static port method. How should the access policy be configured?

A.

by linking the interface policy group to multiple Attachable Access Entity Profiles

A.

by linking the interface policy group to multiple Attachable Access Entity Profiles

Answers
B.

with a single Attachable Access Entity Profile that is linked to the corresponding routed domain and physical domain

B.

with a single Attachable Access Entity Profile that is linked to the corresponding routed domain and physical domain

Answers
C.

with two interface policy groups that are linked to the same interface profile port selector

C.

with two interface policy groups that are linked to the same interface profile port selector

Answers
D.

by mapping a single physical domain, mapped to the L3out and EPG interfaces

D.

by mapping a single physical domain, mapped to the L3out and EPG interfaces

Answers
Suggested answer: A

Explanation:

In Cisco ACI, an interface policy group can be linked to multiple Attachable Access Entity Profiles (AAEPs) to support connectivity for various EPGs with L3Outs. This setup allows for the concurrent support of L3Out connectivity and multiple EPGs on a single access port.Reference: This concept is covered in the section on ACI access policies in the DCCOR course.

Total 491 questions
Go to page: of 50