ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 25

Question list
Search
Search

List of questions

Search

Related questions











An engineer must configure the order in which the server attempts to boot from available boot device types using Cisco Integrated Management Controller (Cisco IMC). The engineer must change the boot order configuration during the setup and apply the new requirements multiple times. The requirement is to change the Cisco IMC actual boot order so it is different from the configured boot order. Which setting accomplishes this goal?

A.

Enable the system to boot with the configured boot order.

A.

Enable the system to boot with the configured boot order.

Answers
B.

Set the boot configuration directly through BIOS.

B.

Set the boot configuration directly through BIOS.

Answers
C.

Configure the legacy and precision boot order to be mutually exclusive.

C.

Configure the legacy and precision boot order to be mutually exclusive.

Answers
D.

Apply UEFI Secure Boot for a nonsupported operating system.

D.

Apply UEFI Secure Boot for a nonsupported operating system.

Answers
Suggested answer: B

Explanation:

Changing the boot order during setup and applying new requirements multiple times can be achieved by setting the boot configuration directly through the BIOS. This allows the engineer to modify the boot order as needed, separate from the configured boot order in Cisco IMC.Reference: The DCCOR course discusses server boot order configuration and the use of BIOS settings for such purposes.

Refer to the exhibit.

Refer to the exhibit. An engineer logs all occurrences of a configuration being saved. The engineer must generate an additional log message when someone attempts to change the configuration for interface Ethernet 1/1. Which set of commands must be used to meet these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

An engineer must apply AAA configuration on a Cisco MDS 9000 Series Switch. The solution must meet these conditions:

It must use a challenge-response authentication protocol that uses MD5 hashing with an incrementally changing identifier

The RADIUS configuration must t>e automatically shared with other MDS switches in the environment.

The RADIUS server is already defined. Which command set completes the configuration?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The correct command set for configuring AAA to use CHAP with MD5 hashing and to share the RADIUS configuration across MDS switches involves using theaaa authentication logincommand with theradiuskeyword and enabling CHAP. Theradius distributecommand is used to share the RADIUS configuration automatically with other MDS switches in the environment.

Cisco MDS 9000 Series Security Configuration Guide1

Configuring FC-SP and DHCHAP2

Please note that the actual commands may vary based on the specific requirements and the version of the Cisco NX-OS software running on your switch. It's always best to consult the latest Cisco documentation or a certified Cisco technical expert for the most accurate information.

An engineer must implement a solution that prevents untrusted DHCP servers from compromising the network. The feature must be configured on a Cisco Nexus 7000 Series Switch and applied to VLAN 10. The legitimate DHCP servers are connected to interface Ethernet 2/4. Which configuration set must be used to meet these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

The DHCP snooping feature acts as a firewall between untrusted hosts and trusted DHCP servers. It validates DHCP messages received from untrusted sources and filters out invalid messages. To implement this on a Cisco Nexus 7000 Series Switch for VLAN 10, you would enable DHCP snooping for that VLAN and then configure the specific interface connected to the legitimate DHCP servers to be trusted. This ensures that DHCP responses from the legitimate servers are allowed, while responses from any other servers are blocked.

Cisco Nexus 7000 Series NX-OS Security Configuration Guide1

Configuring DHCP Snooping2

An engineer must configure a monitoring solution for a Cisco Nexus 9000 Series Switch based data center. The solution must provide real-time insight into the network health with subscription-based monitoring. The monitoring must be initiated from the client side, and the data must be sent via encryption. Which configuration steps complete the configuration?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Enable telemetry featureson the Cisco Nexus 9000 Series Switch to collect and send real-time data.

Configure a secure transport mechanism, such as gRPC with TLS encryption, to ensure that the monitoring data is transmitted securely.

Set up a subscription-based monitoring servicethat can process the telemetry data and provide insights into the network health.

An engineer is performing an ISSU upgrade on the Cisco MDS 9000 Series Switch. What is the impact on the control plane of the switch?

A.

It remains down until the next reboot.

A.

It remains down until the next reboot.

Answers
B.

It remains up throughout the update.

B.

It remains up throughout the update.

Answers
C.

It remains down for more than 80 seconds but less than 140 seconds.

C.

It remains down for more than 80 seconds but less than 140 seconds.

Answers
D.

It is down for less than 80 seconds.

D.

It is down for less than 80 seconds.

Answers
Suggested answer: B

Explanation:

An ISSU upgrade on the Cisco MDS 9000 Series Switch allows for software updates with minimal impact on the switch's operation. The control plane remains up during the upgrade, ensuring continuous network operations and service availability.The process is carefully designed to prevent any significant downtime, and any brief disruption is kept well under the 120-second mark1.

A company provides applications and database hosting services to multiple customers using isolated infrastructure-as-a-service services within the same data center environment. The environment is based on Cisco MDS 9000 Series Switches. The requirement is to manage the environment by using Fibre Channel Security Protocol and to enable user authentication when the centralized AAA server is unreachable All communication between the MDS switches and the remote servers must be encrypted. Which command set must be used to meet these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The command set in Option C is likely to configure the Cisco MDS switches to use FC-SP for authentication and to ensure communication remains encrypted even when the AAA server is not reachable.This would typically involve configuring the switches to fall back on local authentication databases and enabling features such as DHCHAP (Diffie-Hellman Challenge Handshake Authentication Protocol) to maintain encrypted communication12.

An engineer must create an EPG called 'Test'. The configuration request should succeed if the Tenant called 'Tenant' and the application profile called 'Test'' exist. The firewall policy allows only the HTTP connectivity to APIC from the user's computer. Which action accomplishes this goal?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

Option C correctly uses an HTTP POST request to send the necessary payload to Cisco APIC. This method is suitable for creating new resources like an EPG when the specified Tenant and application profile exist. The POST request will ensure that the configuration is applied only if the conditions are met, aligning with the requirement that the firewall policy allows only HTTP connectivity.

An engineer must implement a disaster recovery policy for the Cisco UCS infrastructure. The solution must meet these criteria:

The Recovery Point Objective must be 48 hours.

The backup must use encrypted transmission.

The Recovery Time Objective must be 4 hours.

Which configuration set must be used in the scheduled backup to meet these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

Option A, which utilizes the SFTP protocol with a weekly schedule, aligns with the requirements. SFTP ensures encrypted transmission of data, addressing the need for secure backup. A weekly backup schedule is within the 48-hour Recovery Point Objective (RPO), as it guarantees that the most data that could be lost in a disaster is one week's worth, which is acceptable within the given RPO. The Recovery Time Objective (RTO) of 4 hours is related to the restoration process rather than the backup schedule or protocol, so it is not directly influenced by the choice of Option A.

Refer to the exhibit.

Refer to the exhibit. Which feature set must be used to configure on switch 2 to establish a VSAN trunk between switch 1 and switch 2?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The configuration in Option C likely involves setting the port to N Port and enabling Trunk Mode Active.This setup is necessary for establishing a VSAN trunk, as it allows the port to actively negotiate with the other switch to transmit and receive frames in multiple VSANs over the same physical link1.

Total 491 questions
Go to page: of 50