ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











An engineer must perform a software upgrade on a production Cisco Nexus 7000 Series Switch. Before the upgrade activity, the requirement is for all ports to be shut down and routing protocols to terminate gracefully. Which feature must be used to meet these requirements?

A.

Configuration Profile

A.

Configuration Profile

Answers
B.

Maintenance Mode Profile

B.

Maintenance Mode Profile

Answers
C.

Switch Profile

C.

Switch Profile

Answers
D.

Service Profile Template

D.

Service Profile Template

Answers
Suggested answer: B

Explanation:

The Maintenance Mode Profile feature in Cisco Nexus 7000 Series Switches is used to ensure a controlled shutdown of ports and graceful termination of routing protocols before performing a software upgrade12.Reference:= Cisco Nexus 7000 Series NX-OS Software Upgrade and Downgrade Guide12.

When deploying a Cisco HyperFlex edge with a pair of switches, what is the minimum number of interfaces in trunk mode required on each HX node?

A.

1

A.

1

Answers
B.

2

B.

2

Answers
C.

4

C.

4

Answers
D.

6

D.

6

Answers
Suggested answer: B

Explanation:

When deploying a Cisco HyperFlex edge with a pair of switches, the minimum number of interfaces in trunk mode required on each HX node is two 10/25GE ports3.Reference:= Cisco HyperFlex Edge Deployment Guide, Release 5.0(x)3.

What is a characteristic of the NFS protocol?

A.

It is used for booting Cisco UCS B-Series servers.

A.

It is used for booting Cisco UCS B-Series servers.

Answers
B.

It is used to access a storage array at a block level.

B.

It is used to access a storage array at a block level.

Answers
C.

It uses UDP and HTTP as its transport.

C.

It uses UDP and HTTP as its transport.

Answers
D.

It uses remote procedure calls with TCP/IP for transport.

D.

It uses remote procedure calls with TCP/IP for transport.

Answers
Suggested answer: D

Explanation:

NFS, or Network File System, is a protocol that allows a user on a client computer to access files over a network in a manner similar to how local storage is accessed.NFS uses remote procedure calls (RPC) over TCP/IP for transport4.Reference:= Wikipedia article on Network File System (NFS)4.

A customer asks an engineer to develop a framework that will be used to replace the process of the manual device configuration of Cisco NX-OS devices. The engineer plans to use the programmatic interface that meets these requirements:

The development team is familiar with Windows-based scripting environment using PowerShell.

The customer's security requirements mandate the use of HTTPS transport.

Which solution must be used to meet these requirements?

A.

NX-API

A.

NX-API

Answers
B.

VISORE

B.

VISORE

Answers
C.

Open Agent Container

C.

Open Agent Container

Answers
D.

NETCONF-YANG

D.

NETCONF-YANG

Answers
Suggested answer: A

Explanation:

NX-API is the appropriate solution to meet the requirements specified.It allows for programmatic device configuration using a Windows-based scripting environment like PowerShell and supports HTTPS transport for secure communication1.

Refer to the exhibit.

Refer to the exhibit. Software downgrade is required on a Cisco Nexus 7000 Series Switch. What is displayed when this command is executed?

A.

features and commands that are removed automatically from the configuration

A.

features and commands that are removed automatically from the configuration

Answers
B.

features that are enabled automatically after the downgrade

B.

features that are enabled automatically after the downgrade

Answers
C.

compatibility of software in the system bootflash file

C.

compatibility of software in the system bootflash file

Answers
D.

impact of a software upgrade in ISSU and chassis reload

D.

impact of a software upgrade in ISSU and chassis reload

Answers
Suggested answer: C

Explanation:

The commandshow incompatibility-all system bootflash:n7000-s1-dk9.4.2.4.binis used to display the compatibility of the software in the system bootflash file on a Cisco Nexus 7000 Series Switch.This command is crucial for administrators to verify if the current configuration is compatible with the new software version before performing a downgrade or upgrade, ensuring that there are no conflicts or issues that could potentially disrupt network operations1.

Refer to the exhibit.

Refer to the exhibit. An engineer monitors ingress traffic from Host-A and all traffic for VLAN 20 from Host-B Which configuration must be implemented to monitor and export traffic to Network Analyzer?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

To monitor and export traffic to a Network Analyzer, particularly ingress traffic from Host-A and all traffic for VLAN 20 from Host-B, the engineer must implement a configuration that captures the specified traffic and directs it to the Network Analyzer tool. The correct configuration will depend on the capabilities of the network devices in use and the specifics of the Network Analyzer's requirements.

The configuration must include setting up a SPAN (Switched Port Analyzer) or RSPAN (Remote SPAN) session that mirrors the desired traffic to a port connected to the Network Analyzer. This would involve specifying the source interfaces or VLANs and the destination port for the mirrored traffic. Additionally, the configuration should ensure that the Network Analyzer is capable of receiving and processing the mirrored traffic, which may require additional settings on the Network Analyzer itself.

Refer to the exhibit.

Refer to the exhibit. A network engineer is implementing a configuration checkpoint on a Cisco Nexus 9000 Series Switch. The configuration must skip any existing vPC configuration errors and must complete if there are any configuration errors. The engineer finished the vPC domain configuration part. Which command completes the checkpoint implementation?

A.

stop-at-first-failure

A.

stop-at-first-failure

Answers
B.

atomic

B.

atomic

Answers
C.

best-effort

C.

best-effort

Answers
D.

verbose

D.

verbose

Answers
Suggested answer: C

Explanation:

The 'best-effort' command is used when implementing a configuration checkpoint on a Cisco Nexus 9000 Series Switch to ensure that the process skips any existing vPC configuration errors and completes even if there are other configuration errors. This command is suitable for scenarios where it's critical to proceed with the checkpoint despite errors, allowing the engineer to create a rollback point and address issues without disrupting the entire process.

A storage array must be connected to port ethernet1/10 on a Cisco MDS 9000 Series Switch In addition, the array must connect using the FCoE protocol and be single-homed Which configuration meets these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

Option C meets the security requirements for the Cisco UCS C-Series Server. It disables unencrypted communication by enabling HTTPS, sets the session timeout to 900 seconds (15 minutes), redirects HTTP to HTTPS to divert unencrypted traffic, and changes the SSH port to a nondefault value (2022), which is essential for CLI-based management.

An engineer implements a Cisco UCS C-Series Server that must adhere to these security requirements:

Unencrypted communication must be disabled.

The session timeout must not exceed 15 minutes.

Unencrypted traffic must be automatically diverted.

CLI-based management must use nondefault ports.

Which configuration set meets these requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

Option C meets the security requirements for the Cisco UCS C-Series Server. It disables unencrypted communication by enabling HTTPS, sets the session timeout to 900 seconds (15 minutes), redirects HTTP to HTTPS to divert unencrypted traffic, and changes the SSH port to a nondefault value (2022), which is essential for CLI-based management.

An infrastructure architect is analyzing the deployment type for an application. Several companies must be able to operate the application environment and integrate it with a third-party protocol. The development team also must have maximum control over their development environment, Including the operating system used, Python interpreter, and corresponding libraries. Which cloud deployment solution meets these requirements?

A.

public cloud Storage as a Service

A.

public cloud Storage as a Service

Answers
B.

private cloud Platform as a Service

B.

private cloud Platform as a Service

Answers
C.

hybrid cloud Software as a Service

C.

hybrid cloud Software as a Service

Answers
D.

community cloud Infrastructure as a Service

D.

community cloud Infrastructure as a Service

Answers
Suggested answer: D

Explanation:

A community cloud Infrastructure as a Service (IaaS) deployment model is suitable for several companies that need to operate the same application environment and integrate it with third-party protocols.It allows the development team to have control over the infrastructure, including the operating system, Python interpreter, and libraries

Total 491 questions
Go to page: of 50