ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 33

Question list
Search
Search

List of questions

Search

Related questions











A bridge domain is being extended out of a Cisco ACI fabric. Between which of these components are policies used to identify the connectivity between Endpoint Groups and the external connection?

A.

an external bridge domain and an external routed domain

A.

an external bridge domain and an external routed domain

Answers
B.

internal contracts and external contracts

B.

internal contracts and external contracts

Answers
C.

internal EPGs and external EPGs

C.

internal EPGs and external EPGs

Answers
D.

L2Out and L3Out

D.

L2Out and L3Out

Answers
Suggested answer: D

Explanation:

Policies that identify the connectivity between Endpoint Groups (EPGs) and the external connection when extending a bridge domain out of a Cisco ACI fabric are associated with L2Out and L3Out components. L2Outs are used to extend Layer 2 connectivity outside the ACI fabric, while L3Outs are used for Layer 3 external connections.These policies define how the ACI fabric will communicate with external networks

An engineer must generate a Cisco UCS Manager backup. The backup should include all logical configuration and contain all system and logical configuration settings. Which backup type should be selected to meet these requirements?

A.

system configuration

A.

system configuration

Answers
B.

logical configuration

B.

logical configuration

Answers
C.

all configuration

C.

all configuration

Answers
D.

full state

D.

full state

Answers
Suggested answer: C

Explanation:

The 'all configuration' backup type in Cisco UCS Manager includes both system and logical configuration settings.This backup type is an XML file that encompasses all system and logical configurations, making it suitable for scenarios where a complete backup of all settings is required

Which two protocols are used by the NFSv4 protocol? (Choose two.)

A.

FCP

A.

FCP

Answers
B.

TCP

B.

TCP

Answers
C.

UDP

C.

UDP

Answers
D.

Ethernet

D.

Ethernet

Answers
E.

IP

E.

IP

Answers
Suggested answer: B, E

Explanation:

NFSv4 uses TCP for reliable transport and IP for network layer protocol.TCP ensures reliable delivery of packets, which is crucial for file systems, while IP is used for routing the data packets to their destination

Refer to the exhibit.

Refer to the exhibit A network engineer must run a continuous capture on a port A script called ''capture'1 is created to start and stop the capture task Which command sequence makes the capture persistent after a reboot?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To make a capture task persistent after a reboot, the command sequence in Option C should be used. This typically involves enabling the service to start at boot time usingsystemctl enableand then starting the service withsystemctl start.This ensures that the capture task will automatically resume after the system is rebooted4

A company plans to deploy a Cisco HyperFlex solution for data-intensive applications and databases The proposed solution should offer the highest performance with high consistency and low latency Which Cisco HyperFlex storage configuration should be used?

A.

All-HDD

A.

All-HDD

Answers
B.

AII-NVMe

B.

AII-NVMe

Answers
C.

All-Flash

C.

All-Flash

Answers
D.

Hybrid

D.

Hybrid

Answers
Suggested answer: B

Explanation:

For a deployment that requires high performance with consistency and low latency, an All-NVMe Cisco HyperFlex storage configuration is the optimal choice. NVMe drives offer superior speed and efficiency compared to other storage mediums, making them ideal for data-intensive applications and databases.

Refer to the exhibit.

Refer to the exhibits An engineer must implement a SPAN session that sends a copy of all VLAN 11 traffic on N5K_1 to the Traffic Capturing Device The configuration that is presented is already applied to the Cisco UCS Manager. Which additional action meets the objective'?

A.

Assign the VLAN to the monitored port.

A.

Assign the VLAN to the monitored port.

Answers
B.

Choose VLAN 11 under the VSANs section.

B.

Choose VLAN 11 under the VSANs section.

Answers
C.

Select the Clear Destination feature.

C.

Select the Clear Destination feature.

Answers
D.

Create a LAN traffic monitoring session.

D.

Create a LAN traffic monitoring session.

Answers
Suggested answer: D

Explanation:

To meet the objective of sending a copy of all VLAN 11 traffic on N5K_1 to the Traffic Capturing Device, creating a LAN traffic monitoring session is the necessary action. This session will capture the specified VLAN traffic and forward it to the designated capturing device for analysis or monitoring purposes. The existing configuration in Cisco UCS Manager needs to be complemented with this session to achieve the desired traffic capture.

An engineer must migrate a Cisco UCS C-Series server from Cisco SingleConnect to direct integration mode. The Cisco UCS Manager Rack Server Discovery Policy and Rack Management Connection Policy are set to immediate and Auto-Acknowledge. Which set of steps accomplishes this task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To migrate a Cisco UCS C-Series server from Cisco SingleConnect to direct integration mode with immediate discovery and auto-acknowledge policies, the steps in Option C are appropriate.These steps typically involve disconnecting the cables from the FEX, connecting them to the appliance ports on the fabric interconnect, and reacknowledging the server

An engineer is configuring HTTPS access to Cisco UCS Manager The engineer created a keyring and created the certificate request for the keyring Cisco UCS Manager continues to receive untrusted messages from a Firefox browser and a Chrome browser Which action must be taken as the next step in the HTTPS access configuration?

A.

Create a trusted point

A.

Create a trusted point

Answers
B.

Sign the certificate using the Cisco UCS Manager.

B.

Sign the certificate using the Cisco UCS Manager.

Answers
C.

Obtain a validated certificate from Cisco

C.

Obtain a validated certificate from Cisco

Answers
D.

Install a trusted certificate in the browser store

D.

Install a trusted certificate in the browser store

Answers
Suggested answer: A

Explanation:

After creating a keyring and generating a certificate request, the next step is to create a trusted point.This involves downloading the certificate chain from the CA authority, converting it to the required format, and creating a Trust-Point on UCS Manager where the certificate details are pasted

A SAN administrator must Implement Infrastructure monitoring for the Fibre Channel storage environment. The storage environment consists of a standalone Cisco Nexus 9000 Series Switch and Cisco MDS 9000 Series Switches. The goal is to be able to visualize the SAN support VXLAN overlays and identify storage slow drain issues. Which monitoring solution accomplishes this task?

A.

Cisco Prime Infrastructure

A.

Cisco Prime Infrastructure

Answers
B.

Cisco DCNM

B.

Cisco DCNM

Answers
C.

Cisco APIC

C.

Cisco APIC

Answers
D.

Cisco Intersight

D.

Cisco Intersight

Answers
Suggested answer: B

Explanation:

Cisco Data Center Network Manager (DCNM) is the monitoring solution that can fulfill the requirements of visualizing the SAN, supporting VXLAN overlays, and identifying storage slow drain issues for a Fibre Channel storage environment consisting of Cisco Nexus 9000 and MDS 9000 Series Switches3.

An engineer must implement private VLANs for a group of Cisco UCS 8-Series servers. The primary VLAN is present, But the secondary VLAN must Be added to Both fabrics. Which configuration set accomplishes this task?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To implement private VLANs for Cisco UCS 8-Series servers, the primary VLAN is already present, and the secondary VLAN needs to be added to both fabrics. The correct configuration set that accomplishes this task is Option C.This option includes the necessary commands to create the VLAN and set its sharing to secondary, which is required for the configuration of private VLANs in a Cisco UCS environment12.

Total 491 questions
Go to page: of 50