ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 29

Question list
Search
Search

List of questions

Search

Related questions











An engineer is implementing the Cisco ACI fabric and must create two different vPCs from leaf switches A and B. The vPCs are deployed as follows:

* vPC 1 encompasses ports Eth 1 /1 on leaf A and B and connects to server 1.

* vPC 2 encompasses port Eth1/2 on leaf A and B and connects to server 2.

A leaf switch profile listing leaves A and B is already configured Which ACI object must be created to meet these requirements?

A.

two vPC interface policy groups

A.

two vPC interface policy groups

Answers
B.

one access port interface policy group

B.

one access port interface policy group

Answers
C.

two PortChannel interface policy groups

C.

two PortChannel interface policy groups

Answers
D.

one vPC interface policy group

D.

one vPC interface policy group

Answers
Suggested answer: D

Explanation:

In Cisco ACI, a virtual Port Channel (vPC) allows links that are physically connected to two different ACI leaf nodes to appear as a single port channel to a third device. When configuring vPCs in ACI, you do not need to create multiple interface policy groups for each vPC. Instead, you create a single vPC interface policy group that can be applied to multiple vPCs. This is because the fabric itself serves as the multi-chassis trunk (MCT), and peer reachability is managed through the fabric, not through physical peer-links. Therefore, for the scenario described, where two vPCs are created from leaf switches A and B, only one vPC interface policy group is required.

An engineer must affirm the identity of the Cisco UCS Manager after a valid CA-signed keyring for HTTPS access is created. Which action completes the configuration?

A.

Set Cipher Suite Mode

A.

Set Cipher Suite Mode

Answers
B.

Create a trusted point

B.

Create a trusted point

Answers
C.

Implement SSLv3

C.

Implement SSLv3

Answers
D.

Enable TLSv1.2

D.

Enable TLSv1.2

Answers
Suggested answer: B

Explanation:

After creating a CA-signed keyring for HTTPS access in Cisco UCS Manager, the next step is to create a trusted point.This action associates the keyring with a certificate and designates the certification authority (CA) that will be recognized as valid for the system

An engineer must configure two Cisco Nexus 7000 series switches in the same data center to support OTV. Which command set completes the join interface configuration?

A) Option A

B) Option B

C) Option C

D) Option D

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

In the context of configuring two Cisco Nexus 7000 series switches to support OTV, Option A is the correct answer. The configuration involves setting up an Edge Device with specific interface ethernet and IP address settings. The commands provided in Option A are consistent with the requirements for configuring an OTV join interface on Cisco Nexus 7000 series switches. These commands ensure that the Edge Devices are properly configured to communicate over the OTV.

An engineer performs a Firmware Auto Install upgrade through the Cisco UCS Manager. Which two Cisco UCS components are upgraded in the Install Server Firmware stage? (Choose two)

A.

Cisco UCS C-Series Rack-Mount Server

A.

Cisco UCS C-Series Rack-Mount Server

Answers
B.

I/O Modules

B.

I/O Modules

Answers
C.

Cisco UCS Manager

C.

Cisco UCS Manager

Answers
D.

Cisco UCS B-Series Blade Server

D.

Cisco UCS B-Series Blade Server

Answers
E.

Fabric Interconnects

E.

Fabric Interconnects

Answers
Suggested answer: A, D

Explanation:

During the Install Server Firmware stage of a Firmware Auto Install upgrade through Cisco UCS Manager, the components that are upgraded include the Cisco UCS C-Series Rack-Mount Servers and the Cisco UCS B-Series Blade Servers. This stage uses host firmware packages to upgrade all servers and their components in the Cisco UCS domain.All servers whose service profiles include the selected host firmware packages are upgraded to the firmware versions in the selected software bundles1.

An engineer is implementing traffic monitoring for a server vNIC that is configured with fabric failover enabled. The requirement is for the traffic to be sent to an analyzer, even during a failure of one of the fabric interconnects. The analyzer is connected to unconfigured Ethernet ports on both fabric interconnects. Which configuration accomplishes this task?

A) Create two traffic monitoring session with different names, one per fabric Connect the analyzer connected to FI-BI the destination for both monitoring sessions.

B) Create two traffic monitoring session with different names, one per fabric.

C) Connect an analyser on each FI as the destination for the monitoring session local to the FI.

D) Create two traffic monitoring sessions with the same name, one per fabric Connect the analyze connected to FI-A as the destination for both monitoring sessions

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To implement traffic monitoring for a server vNIC with fabric failover enabled, ensuring that traffic is sent to an analyzer even during a fabric interconnect failure, the correct configuration is to create two traffic monitoring sessions with different names, one per fabric, and connect an analyzer on each FI as the destination for the monitoring session local to the FI.This setup allows continuous monitoring because if one fabric interconnect fails, the other can still send traffic to its connected analyzer2.

An engineer configures a storage environment for a customer with high- security standards. The secure environment is configured in vsan 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Chose two.)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: A, C

Explanation:

To meet the high-security standards, the engineer should configure port security and fabric binding on VSAN 50. Port security prevents unauthorized devices from logging into the fabric by automatically learning and securing the World Wide Port Names (WWPNs) of devices connected to the switch ports. Fabric binding allows only authorized switches to join the fabric by creating a list of switch WWNs that are permitted to join a specific VSAN.

What is an advantage of NAS compared to SAN?

A.

It offers enhanced NFS features.

A.

It offers enhanced NFS features.

Answers
B.

It offers enhanced security features

B.

It offers enhanced security features

Answers
C.

It functions in an existing IP environment.

C.

It functions in an existing IP environment.

Answers
D.

It provides lossless throughput.

D.

It provides lossless throughput.

Answers
Suggested answer: C

Explanation:

NAS functions in an existing IP environment which is one of its advantages over SAN. SAN typically requires a separate network infrastructure, while NAS can be deployed on the existing IP network, leading to cost savings and simplified management.

Cisco Data Center Core Technologies source documents or study guide

Cisco Learning Network Store

Cisco Data Center Solutions

Refer to the exhibit.

Refer to the exhibit. Which feature must be used to configure on switch 2 to establish a VSAN trunk between switch 1 and switch 2?

A.

F port Trunk Mode Passive

A.

F port Trunk Mode Passive

Answers
B.

E Port Trunk Mode On

B.

E Port Trunk Mode On

Answers
C.

N Port Trunk Mode Active

C.

N Port Trunk Mode Active

Answers
D.

NP Port Trunk Mode Auto

D.

NP Port Trunk Mode Auto

Answers
Suggested answer: B

Explanation:

To establish a VSAN trunk between Switch 1 and Switch 2, you would typically configureE PortwithTrunk Mode On. This is because Switch 1 is already configured with an E port in Trunk Mode Auto, and for trunking to be established, the other switch should also be set to trunk mode but with a static configuration (On) to ensure compatibility and trunk formation.

A content delivery network sends video traffic to a multicast distribution device where the receiver requests the traffic from the multicast distribution device through an IGMP join message When the traffic reaches the multicast routing device from a CDN the switching network populates the multicast routing table in the group (S G) and the multicast distribution device sends the required traffic back to the receiver. Which feature is used to send back the trafic from the streamer to the receiver in the group (S G)?

A.

RP

A.

RP

Answers
B.

IGMP

B.

IGMP

Answers
C.

Reverse Path Forwarding

C.

Reverse Path Forwarding

Answers
D.

Source Specific Multicast

D.

Source Specific Multicast

Answers
Suggested answer: C

Explanation:

Reverse Path Forwarding (RPF) is a feature used in IP multicast routing that ensures multicast traffic is sent back to the receiver efficiently and without looping. In the context of a content delivery network (CDN) sending video traffic, when a receiver requests traffic through an IGMP join message, the multicast routing device uses RPF to populate the multicast routing table with the correct source (S) and group (G) information. RPF checks the source of the incoming packet against the multicast routing table and forwards the packet only if it arrives on the interface that leads back to the source. This mechanism prevents traffic loops and ensures that the multicast distribution device sends the required traffic back to the receiver along the most efficient path.

Which two actions are needed to configure a single Cisco APIC controller for Cisco ACI fabric for the first time? (Choose two.)

A.

Register the APIC that is connected to the switch.

A.

Register the APIC that is connected to the switch.

Answers
B.

Configure the first Cisco APIC controller

B.

Configure the first Cisco APIC controller

Answers
C.

Configure the leaf switch where the Cisco APIC is connected, using CLI to allow APIC connectivity

C.

Configure the leaf switch where the Cisco APIC is connected, using CLI to allow APIC connectivity

Answers
D.

Register the switches that are discovered through LLDP.

D.

Register the switches that are discovered through LLDP.

Answers
E.

Register all leaf and spine switches

E.

Register all leaf and spine switches

Answers
Suggested answer: B, D

Explanation:

To configure a single Cisco APIC controller for Cisco ACI fabric for the first time, you need to configure the first Cisco APIC controller (B) and register the switches that are discovered through LLDP (D). The initial configuration of the APIC is crucial as it sets up the controller with the necessary settings to manage the ACI fabric.Registering the switches through LLDP allows the APIC to recognize and manage the fabric switches, which is essential for the ACI fabric to function correctly.Reference: Cisco's official documentation on setting up an ACI fabric1, and the Cisco APIC Basic Configuration Guide2.

Total 491 questions
Go to page: of 50