ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 43

Question list
Search
Search

List of questions

Search

Related questions











An engineer must perform backup and restore of the Cisco UCS Manager configuration. The configuration must be stored on a remote server via XML encoding. The backup must store the configurations of the chassis. FEX, rack servers. lOMs, and blade server. Which set of actions accomplishes these goals?

A.

Perform a logical configuration backup and run the replace import method.

A.

Perform a logical configuration backup and run the replace import method.

Answers
B.

Perform a ful state configuration backup and run the restore procedure.

B.

Perform a ful state configuration backup and run the restore procedure.

Answers
C.

Perform a system configuration backup and run the merge import method

C.

Perform a system configuration backup and run the merge import method

Answers
D.

Perform an all configuration backup and run the system restore procedure.

D.

Perform an all configuration backup and run the system restore procedure.

Answers
Suggested answer: B

Explanation:

A full state configuration backup in Cisco UCS Manager includes a snapshot of the entire system, which is stored as a binary file. This backup type is ideal for disaster recovery as it can restore or rebuild the configuration on the original fabric interconnect or recreate the configuration on a different fabric interconnect. It is important to note that this backup type cannot be used for an import but is specifically designed for system restoration.

Cisco's official documentation on ''Backing Up and Restoring the Configuration'' provides a detailed guide on the backup types and procedures within Cisco UCS Manager1.

The ''Cisco UCS Manager Administration Management Guide 4.2'' further elaborates on backup operations, considerations, and the system restore process

An engineer must optimize ARP responses and reduce unnecessary ARP broadcasts over the VXLAN/EVPN fabric. Which action accomplishes these tasks?

A.

Configure ip proxy-arp under the VLAN SVI associated with the VXLAN VNI.

A.

Configure ip proxy-arp under the VLAN SVI associated with the VXLAN VNI.

Answers
B.

Configure ip proxy-arp within the VXLAN VNI configuration under the VTEP NVE interface.

B.

Configure ip proxy-arp within the VXLAN VNI configuration under the VTEP NVE interface.

Answers
C.

Configure suppress-arp within the VXLAN VNI configuration under the VTEP NVE interface.

C.

Configure suppress-arp within the VXLAN VNI configuration under the VTEP NVE interface.

Answers
D.

Configure suppress-arp under the VLAN SVI associated with the VXLAN VNI.

D.

Configure suppress-arp under the VLAN SVI associated with the VXLAN VNI.

Answers
Suggested answer: C

Explanation:

ARP suppression is a feature used in VXLAN/EVPN environments to optimize ARP responses and reduce unnecessary ARP broadcasts across the fabric. When ARP suppression is enabled, the local VTEP (VXLAN Tunnel Endpoint) can respond to ARP requests for known IP-to-MAC address bindings, which are learned via the BGP EVPN control plane.This prevents the need for ARP broadcasts to be sent across the entire VXLAN fabric, thus optimizing the ARP response mechanism and reducing broadcast traffic1.

Cisco Programmable Fabric with VXLAN BGP EVPN Configuration Guide2.

Community discussions on ARP suppression in VXLAN/EVPN

Refer to the exhibit.

A network engineer configures the VXLAN between the routers in a data center. The VLAN 10 must be extended between routers A and B. The initial VXLAN configuration is completed on RouterA. Which configuration finishes the VXLAN configuration on Router A?

A.

B.

C.

D.


A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

To finish the VXLAN configuration on Router A for extending VLAN 10 between routers A and B, the correct configuration would involve setting up the NVE interface, associating it with the VNI that corresponds to VLAN 10, and specifying the peer VTEP IP address for Router B. This setup will ensure that the VLAN is extended over the VXLAN tunnel between the two routers.

Cisco Data Center Core Technologies (DCCOR) study materials.

Cisco Nexus 9000 Series NX-OS VXLAN Configuration Guide1.

Cisco Programmable Fabric with VXLAN BGP EVPN Configuration Guide

Refer to the exhibit.

Refer to the exhibit. An engineer must configure a QoS policy that controls only vHBA traffic. Which policy must be used to meet this requirement?

A.

Best Effort

A.

Best Effort

Answers
B.

Fibre Channel

B.

Fibre Channel

Answers
C.

Gold

C.

Gold

Answers
D.

Platinum

D.

Platinum

Answers
Suggested answer: B

Explanation:

The QoS policy that controls only vHBA traffic is the Fibre Channel policy. In Cisco UCS, the Fibre Channel policy is specifically designed to manage the quality of service for traffic related to virtual Host Bus Adapters (vHBAs), which are used for Fibre Channel over Ethernet (FCoE) storage networking. This policy ensures that the storage traffic is appropriately prioritized and managed within the system.

Cisco UCS Manager GUI Configuration Guide, which provides details on configuring QoS policies for vHBA traffic.

Cisco Data Center Core Technologies (DCCOR) study materials, which cover the concepts of QoS and vHBA configuration in a Cisco data center environment.

An engineer requires the Cisco Fabric Services to distribute NTP configuration only to the members within the scope of a VSAN that belongs to a Cisco Unified Network. Which scope distribution must be selected to meet this requirement?

A.

Logical scope

A.

Logical scope

Answers
B.

Physical scope

B.

Physical scope

Answers
C.

Uncoordinated scope

C.

Uncoordinated scope

Answers
D.

Coordinated scope

D.

Coordinated scope

Answers
Suggested answer: A

Explanation:

Cisco Fabric Services (CFS) offers a logical scope distribution mode that allows configurations to be distributed within the scope of a VSAN. This mode is suitable for features like NTP, where the configuration database is applicable only within a VSAN. It ensures that changes are contained within the specific VSAN, preventing any impact on other VSANs in the network.

Cisco's official documentation on Configuring and Managing VSANs1provides a detailed explanation of VSANs, their advantages, and how they can be managed using CFS.

The Cisco Fabric Services guide2further elaborates on the features of CFS, including the logical scope distribution mode and its relevance to features like NTP.

Community discussions on NTP configuration3can also provide practical insights into the application of these settings in real-world scenarios.

A new user with access privileges in the Finance department moves to a new Admin department. The user must have access privileges to the Admin department data and applications inside the Cisco UCS Manager Which set of changes must be implemented in Cisco UCS Central for the user to acquire the privileges?

A.

Create an Admin user account and remove the authentication service for the Finance privileges.

A.

Create an Admin user account and remove the authentication service for the Finance privileges.

Answers
B.

Disable the Finance user account and add the authentication service for the Admin privileges.

B.

Disable the Finance user account and add the authentication service for the Admin privileges.

Answers
C.

Create a new locale Admin and add the Admin department to the Admin locale. Delete the old locale

C.

Create a new locale Admin and add the Admin department to the Admin locale. Delete the old locale

Answers
D.

Finance and remove the Finance department from the Finance locale.

D.

Finance and remove the Finance department from the Finance locale.

Answers
Suggested answer: C

Explanation:

In Cisco UCS Central, user privileges are managed through roles and locales. When a user moves departments, their access privileges need to be updated to reflect their new role. By creating a new locale for the Admin department and adding the user to this locale, the user's access privileges are updated to include the Admin department's data and applications.The old Finance locale should be deleted, or the user should be removed from it, to revoke the previous access privileges1.

Cisco UCS Central Administration Guide1.

Cisco UCS Central User Accounts and Role-Based Access Control Overview2.

Assigning User Privileges in Cisco UCS documentation

A network engineer must download a firmware image from a remote location to a Cisco UCS Fabric Interconnect. The software bundle is over 232 MB in size. The file transfer must use encryption and authentication Which protocol must be used to accomplish this goal?

A.

RDP

A.

RDP

Answers
B.

HTTPS

B.

HTTPS

Answers
C.

SCP

C.

SCP

Answers
D.

TFTP

D.

TFTP

Answers
Suggested answer: B

Explanation:

When downloading a firmware image to a Cisco UCS Fabric Interconnect, especially from a remote location, it is crucial to use a protocol that provides both encryption and authentication to ensure the security and integrity of the file transfer. HTTPS (Hypertext Transfer Protocol Secure) is the protocol that meets these requirements.It is widely used for secure communication over a computer network within a web browser, with encryption provided by Transport Layer Security (TLS), which ensures that the transfer of the firmware image is secure and authenticated1.

Cisco UCS Manager Firmware Management Guide, which provides detailed instructions on managing firmware through UCS Manager, including downloading firmware images to the Fabric Interconnect

A network engineer must configure a Fibre Channel interface on the Cisco MDS 9000 Series Switch The configuration must meet these requirements

* The interface must be disabled when the bit errors threshold Is exceeded

* Buffer-to-buffer credits must be set to the maximum value

* The interface must have full bandwidth allocated for its port group

Which command set configures a Fibre Channel interface that meets these requirements?

A.

B.

C.

D.


A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: A

Explanation:

The command set in option A is the correct one for configuring a Fibre Channel interface on the Cisco MDS 9000 Series Switch to meet the specified requirements. The ''no switchport bit-errors'' command ensures that the interface is disabled when the bit errors threshold is exceeded. The ''switchport fcrxbbcredit 220 mode Fx'' command sets buffer-to-buffer credits to their maximum value, ensuring optimal performance and flow control. Lastly, ''no switchport rate-mode'' ensures that the interface has full bandwidth allocated for its port group, maximizing data throughput and efficiency.

Cisco MDS 9000 Series Fabric Switches Configuration Guide

Cisco Data Center Core Technologies (DCCOR) study materials

Refer to the exhibit.

An engineer must set access to Cisco IMC. The access must be allowed by logging onto the https //datacenter local web page The configuration presented is on the Cisco UCS C240 Series Server Which set of commands completes the configuration?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

To set access to Cisco IMC (Integrated Management Controller) and allow logging onto thehttps://datacenter.localweb page, the correct set of commands is found in option C. These commands will configure the network settings on the Cisco UCS C240 Series Server to enable web access to the Cisco IMC interface. The configuration typically involves setting the correct IP address, gateway, and other network parameters that align with the data center's network design.

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide

Cisco Data Center Core Technologies (DCCOR) study materials

Refer to the exhibit An engineer must mirror the traffic on a switch The engineer locates the server port that requires monitoring on switch1, but the packet sniffer is on switch2 The engineer must configure the source IP address on switch1 Much command accomplishes this goal?

A.

monitor session 10 type erspan-source

A.

monitor session 10 type erspan-source

Answers
B.

monitor erspon origin ip-address 209.165.200.225

B.

monitor erspon origin ip-address 209.165.200.225

Answers
C.

source ip 209.165.200.225

C.

source ip 209.165.200.225

Answers
D.

source interface vbn512

D.

source interface vbn512

Answers
Suggested answer: B

Explanation:

The correct command to configure the source IP address on switch1 for mirroring traffic to a packet sniffer located on switch2 is option B, ''monitor erspan origin ip-address 209.165.200.225''. This command sets the origin IP address for the Encapsulated Remote SPAN (ERSPAN) session, which allows traffic from a source port on one switch to be monitored on a destination port on another switch across an IP network.

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide

Cisco Data Center Core Technologies (DCCOR) study materials

Total 491 questions
Go to page: of 50