ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 38

Question list
Search
Search

List of questions

Search

Related questions











A network administrator is using the Cisco ESA with Cisco AMP to upload files to the cloud for analysis. The network is congested and is affecting communication. How will the Cisco ESA handle any files which need analysis?

A.

Cisco AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

A.

Cisco AMP calculates the SHA-256 fingerprint, caches it, and periodically attempts the upload.

Answers
B.

The Cisco ESA immediately makes another attempt to upload the file.

B.

The Cisco ESA immediately makes another attempt to upload the file.

Answers
C.

The file is queued for upload when connectivity is restored.

C.

The file is queued for upload when connectivity is restored.

Answers
D.

The file upload is abandoned.

D.

The file upload is abandoned.

Answers
Suggested answer: C

Explanation:

The file is queued for upload when connectivity is restored

What is a benefit of using Cisco Tetration?

A.

It collects telemetry data from servers and then uses software sensors to analyze flow information.

A.

It collects telemetry data from servers and then uses software sensors to analyze flow information.

Answers
B.

It collects near-real time data from servers and inventories the software packages that exist on servers.

B.

It collects near-real time data from servers and inventories the software packages that exist on servers.

Answers
C.

It collects policy compliance data and process details.

C.

It collects policy compliance data and process details.

Answers
D.

It collects enforcement data from servers and collects interpacket variation.

D.

It collects enforcement data from servers and collects interpacket variation.

Answers
Suggested answer: A

Explanation:

.It collects telemetry data from servers and then uses software sensors to analyze flow information

A network engineer must migrate a Cisco WSA virtual appliance from one physical host to another physical host by using VMware vMotion. What is a requirement for both physical hosts?

A.

The hosts must run Cisco AsyncOS 10.0 or greater.

A.

The hosts must run Cisco AsyncOS 10.0 or greater.

Answers
B.

The hosts must have access to the same defined network.

B.

The hosts must have access to the same defined network.

Answers
C.

The hosts must run different versions of Cisco AsyncOS.

C.

The hosts must run different versions of Cisco AsyncOS.

Answers
D.

The hosts must use a different datastore than the virtual appliance

D.

The hosts must use a different datastore than the virtual appliance

Answers
Suggested answer: B

Explanation:

When using VMware vMotion to migrate a Cisco WSA virtual appliance from one physical host to another, it is essential that both physical hosts have access to the same network configurations. This includes the same defined networks to which the interfaces on the virtual appliance are mapped.This requirement ensures that the virtual appliance retains its network connectivity and continues to function correctly after the migration1.

A Cisco Nexus 7000 Series switch runs VXLAN, and interface Ethernet 7/30 is configured as a trunk port. Which command set configures the switch to act as a gateway for VLAN 50?

interface Ethernet7/30

no switchport

no shutdown

service instance 1 vni

no shutdown

A.

encapsulation profile VSI_50_TO_500 default

A.

encapsulation profile VSI_50_TO_500 default

Answers
B.

encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Vlan500 ip address 10.50.50.51/24

B.

encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Vlan500 ip address 10.50.50.51/24

Answers
C.

encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Bdi500 jp address 10.50.50.51/24

C.

encapsulation profile vni VSI_50_TO_500 dot1q 500 vni 50 bridge-domain 500 member vni 50 interface Bdi500 jp address 10.50.50.51/24

Answers
D.

encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500bridge-domain 50 member vni 500 interface Bdi50 ip address 10.50.50.51/24

D.

encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500bridge-domain 50 member vni 500 interface Bdi50 ip address 10.50.50.51/24

Answers
E.

encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500 bridge-domain 50 member vni 500 interface Vlan50 ip address 10.50.50.51/24

E.

encapsulation profile vni VSI_50_TO_500 dot1q 50 vni 500 bridge-domain 50 member vni 500 interface Vlan50 ip address 10.50.50.51/24

Answers
Suggested answer: D

Explanation:

To configure a Cisco Nexus 7000 Series switch to act as a gateway for VLAN 50 in a VXLAN environment, the correct command set includes defining a service instance for the VLAN, specifying the encapsulation profile, and associating the VLAN with a bridge domain and a VNI. The commands should map VLAN 50 to VNI 500 and then configure an SVI (Switched Virtual Interface) for VLAN 50 with an IP address.This allows the switch to route traffic for VLAN 50, acting as a gateway1.

What is a benefit of using the Cisco UCS Lightweight upgrade feature?

A.

Security updates are scheduled with the next reboot of the fabric interconnects.

A.

Security updates are scheduled with the next reboot of the fabric interconnects.

Answers
B.

All servers are rebooted to push the latest updates.

B.

All servers are rebooted to push the latest updates.

Answers
C.

The firmware version of a component is updated only when it has been modified.

C.

The firmware version of a component is updated only when it has been modified.

Answers
D.

A soft reboot is available for the fabric interconnects.

D.

A soft reboot is available for the fabric interconnects.

Answers
Suggested answer: C

Explanation:

The Cisco UCS Lightweight Upgrade feature offers the benefit of updating the firmware version of a component only if there has been a modification.This means that not all components will be updated in every service pack, which can reduce downtime and the potential for disruptions caused by unnecessary updates1.

An engineer must suggest a deployment model for a newly developed application. The engineer has a small starting budget and lacks technical knowledge and infrastructure to implement storage, operating system, and database services to support the application deployment. The engineer also needs usage data related to the service and the ability to elastically scale the deployment as customer demands grow. Which two models must be used to meet the requirements?

(Choose two.)

A.

private cloud

A.

private cloud

Answers
B.

platform as a service

B.

platform as a service

Answers
C.

software as a service

C.

software as a service

Answers
D.

infrastructure as a service

D.

infrastructure as a service

Answers
E.

public cloud

E.

public cloud

Answers
Suggested answer: B, E

Explanation:

Platform as a Service (PaaS) provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app. Public cloud services are offered over the internet and are available to anyone who wants to purchase or use them.They are ideal for an engineer with a small budget and limited technical knowledge because they provide a cost-effective, scalable infrastructure that can grow with customer demand2.

An engineer needs to install a new package on a Cisco Nexus 9000 Series Switch. What is the impact of running the install commit <filename> command on the switch?

A.

The switch is restarted after the upgrade is complete

A.

The switch is restarted after the upgrade is complete

Answers
B.

The package is used after the switch is restarted.

B.

The package is used after the switch is restarted.

Answers
C.

The previous package that was in use is deleted from bootflash.

C.

The previous package that was in use is deleted from bootflash.

Answers
D.

The package is used in the running configuration.

D.

The package is used in the running configuration.

Answers
Suggested answer: B

Explanation:

When you run theinstall commit <filename>command on a Cisco Nexus 9000 Series Switch, it schedules the new package to be used after the next reboot of the switch. This means that the current running configuration isn't immediately affected by the new package, but it will be incorporated once the switch is restarted.

An engineer is implementing traffic monitoring for a server vNIC that is configured with fabric failover enabled. The requirement is for the traffic to be sent to an analyzer, even during a failure of one of the fabric interconnects. The analyzer is connected to unconfigured Ethernet ports on both fabric interconnects. Which configuration accomplishes this task?

A.

Create two traffic monitoring sessions with different names, one per fabric Connect the analyzer connected to FI-B as the destination for both monitoring sessions.

A.

Create two traffic monitoring sessions with different names, one per fabric Connect the analyzer connected to FI-B as the destination for both monitoring sessions.

Answers
B.

Create two traffic monitoring sessions with the same name, one per fabric. Connect an analyzer on each Fl as the destination for the monitoring session local to that FI.

B.

Create two traffic monitoring sessions with the same name, one per fabric. Connect an analyzer on each Fl as the destination for the monitoring session local to that FI.

Answers
C.

Create two traffic monitoring sessions with the same name, one per fabric. Connect the analyzer connected to FI-A as the destination for both monitoring sessions.

C.

Create two traffic monitoring sessions with the same name, one per fabric. Connect the analyzer connected to FI-A as the destination for both monitoring sessions.

Answers
D.

Create two traffic monitoring sessions with different names, one per fabric. Connect an analyzer on each FI as the destination for the monitoring session local to the FI

D.

Create two traffic monitoring sessions with different names, one per fabric. Connect an analyzer on each FI as the destination for the monitoring session local to the FI

Answers
Suggested answer: D

Explanation:

For traffic monitoring with fabric failover enabled, it's important to ensure that traffic can still be analyzed even if one of the fabric interconnects fails. By creating two separate traffic monitoring sessions, each with a unique name and connected to an analyzer on each fabric interconnect, you can maintain continuous monitoring. This setup ensures that traffic is sent to the analyzer regardless of the state of either fabric interconnect.

A network engineer must deploy a configuration backup policy to the Cisco UCS Manager. The file generated from this backup must have a snapshot of the entire system that should be used to restore the system during disaster recovery. The backup file must be transferred insecurely by using the TCP protocol. Which configuration backup settings meet these requirements?

A.

Type: All Configuration Protocol: SCP

A.

Type: All Configuration Protocol: SCP

Answers
B.

Type: Logical Configuration Protocol: SFTP

B.

Type: Logical Configuration Protocol: SFTP

Answers
C.

Type: Full State Protocol: FTP

C.

Type: Full State Protocol: FTP

Answers
D.

Type: System Configuration Protocol: TFTP

D.

Type: System Configuration Protocol: TFTP

Answers
Suggested answer: C

Explanation:

The 'Full State' backup type in Cisco UCS Manager is designed to capture a snapshot of the entire system, which includes all configuration settings, system logs, and the operating system. This comprehensive backup can be used to fully restore the system in the event of a disaster recovery scenario. The 'Full State' backup is the only option that provides a complete system snapshot, making it the ideal choice for disaster recovery purposes.

Refer to the exhibit.

An engineer configures port security on a Cisco Nexus 9000 Series Switch. The requirement is to prevent any newly learned MAC addresses from forwarding traffic on the interface. Also, the already learned MAC addresses must not be affected by the changes. Which configuration meets these requirements?

A.

switchport port-security violation shutdown

A.

switchport port-security violation shutdown

Answers
B.

switchport port-security violation isolate

B.

switchport port-security violation isolate

Answers
C.

switchport port-security violation protect

C.

switchport port-security violation protect

Answers
D.

switchport port-security violation restrict

D.

switchport port-security violation restrict

Answers
Suggested answer: C

Explanation:

The 'protect' violation mode in port security is designed to drop packets with unknown source MAC addresses without affecting the interface's state. This mode ensures that traffic from already learned MAC addresses continues to be forwarded while preventing any new MAC addresses from forwarding traffic until a sufficient number of secure MAC addresses are removed or the maximum count is increased. This configuration aligns with the requirement to not affect already learned MAC addresses.

Total 491 questions
Go to page: of 50