ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 37

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

Refer to the exhibit. An engineer is troubleshooting intermittent connectivity issues between the client PC and the DHCP server. What does the last package captured from the Cisco Nexus 2000 Series Switch indicate?

A.

The DCHP server releases the IP address from the client.

A.

The DCHP server releases the IP address from the client.

Answers
B.

The client receives an IP address from the DHCP server.

B.

The client receives an IP address from the DHCP server.

Answers
C.

The DHCP server sends an IP address via a broadcast message.

C.

The DHCP server sends an IP address via a broadcast message.

Answers
D.

The client sends a unicast message to receive an IP address from the DCHP server.

D.

The client sends a unicast message to receive an IP address from the DCHP server.

Answers
Suggested answer: A

Explanation:

The last packet indicates a DHCP Release message, which is sent by the client to the DHCP server to release the assigned IP address. This is typically done when the client no longer requires the IP address, or before the client shuts down to ensure the IP address can be reassigned. The packet capture showing a DHCP Release message confirms that the client is informing the DHCP server that it is releasing its current IP address.

Due to a newly announced security advisory, a company has been Informed that they must update the configuration of 500 network devices that ate deployed n their network. The engineering team must assist the operations team to prepare for this update. The operations team does not have direct access to the network devices and must log in via a Linux server. This Is the first time that the team is making a network-wide configuration and must change all devices without first installing additional software on the network devices. The operations team is unfamiliar with automation and scripting technologies. Which automation tool must be used to accomplish this goal?

A.

Chef

A.

Chef

Answers
B.

Ansible

B.

Ansible

Answers
C.

Puppet

C.

Puppet

Answers
D.

Saltstack

D.

Saltstack

Answers
Suggested answer: B

Explanation:

Ansible is known for its agentless architecture, which means it does not require any software to be installed on the target devices. It can manage the devices using SSH, which is typically available on most Linux servers.This makes it suitable for scenarios where the operations team needs to update configurations across a large number of devices without direct access1.

DRAG DROP

Drag and drop the firmware packages from the left onto the software bundles they belong to on the right.


Question 363
Correct answer: Question 363

DRAG DROP

A network administrator must automate the process of pinging all the IP addresses from the 10.0.0.0/8 subnet. The subnet is already present in the ARP table of the Cisco Nexus switch. Drag and drop the bash commands to generate the desired output. Not all commands are used.


Question 364
Correct answer: Question 364

Explanation:


DRAG DROP

An engineer must configure remote authentication on a Cisco UCS system. The user password must be encrypted before it is sent to the authentication server. The company security policy requires the server to be based on an open standard. Drag and drop the UCS CLI AAA configuration commands from the left into the order in which they must be implemented on the right. Not all commands are used.


Question 365
Correct answer: Question 365

An engineer must configuration a backup and restore of Cisco UCS Manager during the weekend maintenance windows. The configuration must be restored to its original state on Monday morning. The end users can make changes only to the Service Profile configuration. Which set of actions meets these requirements?

A.

Schedule a system backup to run at the start of every weekend and manually import the backup on Monday morning.

A.

Schedule a system backup to run at the start of every weekend and manually import the backup on Monday morning.

Answers
B.

Schedule a system backup to run at the start of every weekend and schedule the import of the backup to run on Monday morning

B.

Schedule a system backup to run at the start of every weekend and schedule the import of the backup to run on Monday morning

Answers
C.

Schedule a logical backup to run at the start of every weekend and manually import the backup on Monday morning.

C.

Schedule a logical backup to run at the start of every weekend and manually import the backup on Monday morning.

Answers
D.

Schedule a logical backup to run at the start of every weekend and schedule the import of the backup to run on Monday morning.

D.

Schedule a logical backup to run at the start of every weekend and schedule the import of the backup to run on Monday morning.

Answers
Suggested answer: D

Explanation:

A logical backup includes all logical configuration settings such as service profiles, VLANs, VSANs, pools, and policies1. Since the end users are only allowed to make changes to the Service Profile configuration, a logical backup is appropriate as it will capture the state of these configurations without including system settings. Scheduling the logical backup at the start of the weekend ensures that the latest configurations are saved before any changes occur.Scheduling the import of this backup on Monday morning will restore the configurations to their state at the time of the backup, thus reverting any changes made by the end users during the weekend1.

An engineer must implement a new VRF that permits communication between all endpoint groups (EPGs) by default. The new EPGs and bridge domains (BDs) that are created in the new VRF must not require additional configuration to permit traffic between the newly created EPGs or BDs. Which action accomplishes this goal'

A.

Provide and consume a permit any contract on the VRF level

A.

Provide and consume a permit any contract on the VRF level

Answers
B.

Create a VRF in the common tenant.

B.

Create a VRF in the common tenant.

Answers
C.

Place all EPGs in the preferred group.

C.

Place all EPGs in the preferred group.

Answers
D.

Implement a global contract.

D.

Implement a global contract.

Answers
Suggested answer: C

Explanation:

Placing all EPGs in the preferred group within a VRF allows for communication between them without the need for additional contracts.This is because the preferred group feature in Cisco ACI allows EPGs within the same VRF to communicate with each other by default, bypassing the need to provide and consume contracts1.This simplifies the configuration process when new EPGs and bridge domains are added, as they inherit this communication capability by being part of the preferred group1.

An engineer must configure Cisco Nexus 9000 Series Switches for Cisco UCS Director integration The configuration must enable automated onboarding of the switches as they come online. For security purposes, the switches must have the bare minimum of connection methods enabled. The connection protocol must allow authentication through credentials. Which protocol must be configured on the switches to allow automated onboarding?

A.

SNMP

A.

SNMP

Answers
B.

Telnet

B.

Telnet

Answers
C.

SSH

C.

SSH

Answers
D.

HTTPS

D.

HTTPS

Answers
Suggested answer: C

Explanation:

SSH (Secure Shell) is the protocol that allows secure remote login from one computer to another. It provides strong authentication and secure communications over unsecured channels. This protocol is preferred for automated onboarding of devices like Cisco Nexus 9000 Series Switches because it supports strong encryption and credential-based authentication, which aligns with the requirement for minimal connection methods and security.SSH is commonly used in network automation for secure command execution and file transfers1.

An engineer must implement access control tor Cisco UCS Manager. The configuration must meet these requirements.

All users and user groups must be configured using Active Directory.

User1 must have full access to the Fabric Interconnect infrastructure and network security operations

User1 must have full access to the storage operations configuration.

Which action must be performed on Cisco UCS to meet the requirements?

A.

Create a custom rote tot the user and RADIUS for the role-mapping for Active Directory.

A.

Create a custom rote tot the user and RADIUS for the role-mapping for Active Directory.

Answers
B.

Execute a built-in role for the user and LDAP lor the role-mapping for Active Directory.

B.

Execute a built-in role for the user and LDAP lor the role-mapping for Active Directory.

Answers
C.

Create a custom role tor the user and LDAP for the rote-mappings for Active Directory.

C.

Create a custom role tor the user and LDAP for the rote-mappings for Active Directory.

Answers
D.

Execute a built-in role for the user and RADIUS for the role-mapping for Active Directory.

D.

Execute a built-in role for the user and RADIUS for the role-mapping for Active Directory.

Answers
Suggested answer: C

Explanation:

To meet the specified requirements, a custom role needs to be created for User1 that grants full access to both the Fabric Interconnect infrastructure and network security operations, as well as storage operations configuration. This custom role ensures that User1 has the necessary permissions across different areas of the UCS Manager.Using LDAP for role-mapping with Active Directory allows for the integration of UCS Manager with the existing AD infrastructure, enabling centralized management of user credentials and access rights12.

Refer to the exhibit.

Refer to the exhibit. A secure server that provides services to EPG-2 must be placed in EPG-1. The remaining EPGs---EPG-2, EPG-3. and EPG-4---must communicate without any contracts. Which set of actions accomplishes this goal?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

Including EPG-2, EPG-3, and EPG-4 in the preferred group allows these EPGs to communicate with each other without requiring any contracts. This is because the preferred group feature in Cisco ACI allows EPGs within the same VRF to communicate by default. However, since the secure server in EPG-1 must provide services to EPG-2, a contract is required between EPG-1 and EPG-2 to facilitate this communication while maintaining the security and policies necessary for the server.

Total 491 questions
Go to page: of 50