Cisco 350-601 Practice Test - Questions Answers, Page 38
List of questions
Related questions
A network administrator is using the Cisco ESA with Cisco AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?
Cisco AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.
The Cisco ESA immediately makes another attempt to upload the file.
The file is queued for upload when connectivity is restored.
The file upload is abandoned.
What is a benefit of using Cisco Tetration?
It collects telemetry data from servers and then uses software sensors to analyze flow information.
It collects near-real time data from servers and inventories the software packages that exist on servers.
It collects policy compliance data and process details.
It collects enforcement data from servers and collects interpacket variation.
A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?
The hosts must run Cisco AsyncOS 10.0 or greater.
The hosts must have access to the same defined network.
The hosts must run different versions of Cisco AsyncOS.
The hosts must use a different datastore than the virtual appliance
A Cisco Nexus 7000 Series switch runs VXLAN, and interface Ethernet 7/30 is configured as a trunk port. Which command set configures the switch to act as a gateway for VLAN 50?
interface Ethernet7/30
no switchport
no shutdown
service instance 1 vni
no shutdown
encapsulation profile VSI_50_TO_500 default
encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Vlan500 ip address 10.50.50.51/24
encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Bdi500 jp address 10.50.50.51/24
encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500bridge-domain 50 member vni 500 interface Bdi50 ip address 10.50.50.51/24
encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500 bridge-domain 50 member vni 500 interface Vlan50 ip address 10.50.50.51/24
What is a benefit of using the Cisco UCS Lightweight upgrade feature?
Security updates are scheduled with the next reboot of the fabric interconnects.
All servers are rebooted to push the latest updates.
The firmware version of a component is updated only when it has been modified.
A soft reboot is available for the fabric interconnects.
An engineer must suggest a deployment model for a newly developed application. The engineer has a small starting budget and lacks technical knowledge and infrastructure to implement storage, operating system, and database services to support the application deployment. The engineer also needs usage data related to the service and the ability to elastically scale the deployment as customer demands grow. Which two models must be used to meet the requirements?
(Choose two.)
private cloud
platform as a service
software as a service
infrastructure as a service
public cloud
An engineer needs to install a new package on a Cisco Nexus 9000 Series Switch. What is the impact of running the install commit <filename> command on the switch?
The switch is restarted after the upgrade is complete
The package is used after the switch is restarted.
The previous package that was in use is deleted from bootflash.
The package is used in the running configuration.
An engineer is implementing traffic monitoring for a server vNIC that is configured with fabric failover enabled. The requirement is for the traffic to be sent to an analyzer, even during a failure of one of the fabric interconnects. The analyzer is connected to unconfigured Ethernet ports on both fabric interconnects. Which configuration accomplishes this task?
Create two traffic monitoring sessions with different names, one per fabric Connect the analyzer connected to FI-B as the destination for both monitoring sessions.
Create two traffic monitoring sessions with the same name, one per fabric. Connect an analyzer on each Fl as the destination for the monitoring session local to that FI.
Create two traffic monitoring sessions with the same name, one per fabric. Connect the analyzer connected to FI-A as the destination for both monitoring sessions.
Create two traffic monitoring sessions with different names, one per fabric. Connect an analyzer on each FI as the destination for the monitoring session local to the FI
A network engineer must deploy a configuration backup policy to the Cisco UCS Manager. The file generated from this backup must have a snapshot of the entire system that should be used to restore the system during disaster recovery. The backup file must be transferred insecurely by using the TCP protocol. Which configuration backup settings meet these requirements?
Type: All Configuration Protocol: SCP
Type: Logical Configuration Protocol: SFTP
Type: Full State Protocol: FTP
Type: System Configuration Protocol: TFTP
Refer to the exhibit.
An engineer configures port security on a Cisco Nexus 9000 Series Switch. The requirement is to prevent any newly learned MAC addresses from forwarding traffic on the interface. Also, the already learned MAC addresses must not be affected by the changes. Which configuration meets these requirements?
switchport port-security violation shutdown
switchport port-security violation isolate
switchport port-security violation protect
switchport port-security violation restrict
Question