ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 45

Question list
Search
Search

List of questions

Search

Related questions











An engineer must configure a Fibre Channel port channel on a Cisco Nexus 9000 Series Switch. The configuration must meet these requirements:

* A port-channel protocol negotiation is performed with the peer ports.

* The trunk mode must be explicitly configured for the interfaces.

* VSANs from 10 to 20 must be allowed.

Which command set configures the devices to meet the requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The command set in Option C is the correct configuration for a Fibre Channel port channel on a Cisco Nexus 9000 Series Switch that meets the specified requirements. The commands in this option perform port-channel protocol negotiation with peer ports using the ''channel mode active'' command, explicitly configure the trunk mode with ''switchport trunk mode on,'' and allow VSANs from 10 to 20 with ''switchport trunk allowed vsan 10-20.''

Refer to the exhibit.

An engineer must configure fabric binding on a Cisco MDS 9000 Series Switch to match the output. Which fabric database configuration accomplishes this goal?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: C

Explanation:

The correct answer is option C. The fabric binding configuration in option C matches the output required for the Cisco MDS 9000 Series Switch. Fabric binding enhances the security of the SAN fabric by allowing only authorized switches to join the fabric. The configuration includes specifying the switch world wide name (swwn), domain ID, and member world wide node name (nwwn) to ensure that only the specified devices can participate in the fabric.

Refer to the exhibit.

An engineer must create a Bash script to run in the Cisco NX-OS Guest Shell. The script must loop through the available namespaces and output all registered interfaces. Which code snippet completes the script?

A.

chvrf 'Sns';

A.

chvrf 'Sns';

Answers
B.

echo '$ns';

B.

echo '$ns';

Answers
C.

ifconfig '$ns';

C.

ifconfig '$ns';

Answers
D.

vrfinfo'Sns';

D.

vrfinfo'Sns';

Answers
Suggested answer: C

Explanation:

The Bash script is designed to loop through the available namespaces and output all registered interfaces within the Cisco NX-OS Guest Shell. The correct code snippet to complete the script is option C,ifconfig '$ns'. This command will display the network configuration for each namespace, allowing the engineer to view all registered interfaces.

An engineer must automate the provisioning of Cisco ACI objects using the Terraform tool. The engineer must ensure that APIC counts the authentication login requests against the threshold to avoid a DOS attack. Which configuration must be used in Terraform to accomplish these goals?

A.

resources with user ID and password

A.

resources with user ID and password

Answers
B.

resources with signature-based authentication

B.

resources with signature-based authentication

Answers
C.

provider with user ID and password

C.

provider with user ID and password

Answers
D.

provider with signature-based authentication

D.

provider with signature-based authentication

Answers
Suggested answer: D

Explanation:

To automate the provisioning of Cisco ACI objects using Terraform while ensuring that APIC counts the authentication login requests against the threshold to avoid a DOS attack, signature-based authentication should be used. This method involves obtaining an authentication token from Cisco APIC, which will use the token to authenticate. However, APIC counts these authentication requests and applies a threshold to prevent DOS attacks. After too many attempts, the user ID and password authentication method may fail as the threshold is exceeded. To circumvent this issue, signature-based authentication is recommended, where a signature is calculated using a private key and passed with the request. This signature is then used to authenticate the user without being counted against the threshold, thus avoiding the risk of exceeding it and failing authentication.

Refer to the exhibit.

The Cisco NX-OS scheduler must run every day at 3:00 a.m. Which code snippet completes the script?

A.

time start daily 3:00

A.

time start daily 3:00

Answers
B.

time start weekly 7 3:00

B.

time start weekly 7 3:00

Answers
C.

time weekly 7 3:00

C.

time weekly 7 3:00

Answers
D.

time daily 3:00

D.

time daily 3:00

Answers
Suggested answer: D

Explanation:

The correct code snippet to ensure that the Cisco NX-OS scheduler runs every day at 3:00 a.m. is ''time daily 3:00''. This command configures the scheduler to execute the specified job daily at the given time, without the need for a 'start' keyword, which is not required in the syntax for daily repetitive tasks.

An engineer must create a PowerShell script that leverages the Cisco UCS Manager PowerShell module to submit automated requests to Cisco UCS Manager. The engineer must automate the removal of switches from VLANs. Environment variables must provide the VLAN name and switch identifiers. The VLAN must persist when it is removed from the switch port. Which command must the engineer include in the script to accomplish these goals?

A)

B)

C)

D)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: D

Explanation:

The PowerShell command in option D is the correct choice for automating the removal of switches from VLANs using the Cisco UCS Manager PowerShell module. This command uses environment variables to specify the VLAN name and switch identifiers, ensuring that the VLAN persists even when it is no longer associated with the switch port. The command structure allows for the removal of the VLAN association from the switch port without deleting the VLAN itself, thus maintaining the VLAN configuration for potential future use.

A network automation engineer must configure a Cisco NX-OS REST API on a Cisco 9000 Series Switch with these requirements:

* NX-API REST and the DME database must be enabled.

* The NX-API REST must listen for HTTP traffic on port 83.

* The HTTPS certificate must be uploaded.

Which configuration set must be used to accomplish these goals?

A.

feature nxapi nxapi (tcp) port 83 nxapi certificate {httpscrt}

A.

feature nxapi nxapi (tcp) port 83 nxapi certificate {httpscrt}

Answers
B.

feature nxapi nxapi (tcp) port 83 nxapi certificate {httpscrt} nxapi certificate enable

B.

feature nxapi nxapi (tcp) port 83 nxapi certificate {httpscrt} nxapi certificate enable

Answers
C.

feature nxapi nxapi (http) port 83 nxapi certificate {httpscrt}

C.

feature nxapi nxapi (http) port 83 nxapi certificate {httpscrt}

Answers
D.

feature nxapi nxapi {http} port 83 nxapi certificate {httpscrt | httpskey} nxapi certificate enable

D.

feature nxapi nxapi {http} port 83 nxapi certificate {httpscrt | httpskey} nxapi certificate enable

Answers
Suggested answer: B

Explanation:

To meet the requirements for configuring Cisco NX-OS REST API on a Cisco 9000 Series Switch, the correct configuration set is option B. This set of commands enables the NX-API feature, sets the NX-API to listen for HTTP traffic on TCP port 83, uploads the HTTPS certificate, and then enables the certificate. The inclusion of thenxapi certificate enablecommand is crucial as it activates the uploaded certificate, which is necessary for establishing secure HTTPS connections.

Refer to the exhibit.

An engineer reported suspicious behaviour in a server farm that is deployed on the 198.19.1.0/24 subnet. The traffic must be captured only from the server with the IP address of 198.19.1.19/24. The traffic analyzer is connected to the same switch as the server farm. Which configuration set captures the traffic?

A.

switch(config)# ip access-list match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 0.0.0.0 any switch(config)# monitor session 1 switch {config-m on itor)# filter access-group span.filter

A.

switch(config)# ip access-list match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 0.0.0.0 any switch(config)# monitor session 1 switch {config-m on itor)# filter access-group span.filter

Answers
B.

switch(config)# ip access-list match_Server_pkts Switch{config-acl)# permit ip 198.19.1.19 0.0.0.0 any switch(config)# monitor session 1 switch (config-m on itor)# filter access-group 5

B.

switch(config)# ip access-list match_Server_pkts Switch{config-acl)# permit ip 198.19.1.19 0.0.0.0 any switch(config)# monitor session 1 switch (config-m on itor)# filter access-group 5

Answers
C.

switch(config)# ip access-lisl match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 255.255.255.255 any switch(config)# monitor session 1 switch(config-monitor)# filter access-group span.filter

C.

switch(config)# ip access-lisl match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 255.255.255.255 any switch(config)# monitor session 1 switch(config-monitor)# filter access-group span.filter

Answers
D.

switch(config)# ip access-list match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 255.255.255.0 any switch(config)# monitor session 1 switch (config-m on itor)# filter access-group span_filter

D.

switch(config)# ip access-list match_Server_pkts switch(config-acl)# permit ip 198.19.1.19 255.255.255.0 any switch(config)# monitor session 1 switch (config-m on itor)# filter access-group span_filter

Answers
Suggested answer: C

Explanation:

The correct configuration to capture traffic only from the server with the IP address of 198.19.1.19/24 is option C. This configuration uses an IP access list to match packets from the specific IP address with a subnet mask of 255.255.255.255, which indicates a single host. Themonitor sessioncommand is then used to apply this access list to a SPAN session, ensuring that only traffic from the specified server is captured.

Refer to the exhibit.

Two Cisco Nexus Series Switches use EIGRP between their Eth1/1 interfaces. The switches are configured to support EIGRP authentication. Which set of CLI commands must be used to establish EIGRP neighborship?

A)

B)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
Suggested answer: A

Explanation:

EIGRP authentication is used to prevent unauthorized devices from forming neighbor relationships. The correct CLI commands to establish EIGRP neighborship with authentication on Cisco Nexus switches involve configuring the interface with EIGRP, setting the EIGRP autonomous system number, and specifying the authentication key and key-chain. The commands in Option A are consistent with these requirements, hence it is the verified answer.

A QoS policy on Cisco UCS must meet these requirements:

* No-drop class must be configured.

* Jumbo frames must be enabled without fragmentation.

Which configuration must be implemented to mast these conditions?

A.

Configure slow-drain timers and specify an MTU value of 9100 bytes.

A.

Configure slow-drain timers and specify an MTU value of 9100 bytes.

Answers
B.

Create a Flow Control Policy and specify an MTU value of 9000 bytes.

B.

Create a Flow Control Policy and specify an MTU value of 9000 bytes.

Answers
C.

Create a QoS system class and specify an MTU value of 9216 bytes.

C.

Create a QoS system class and specify an MTU value of 9216 bytes.

Answers
D.

Configure Platinum system class and specify an MTU value of 9100 bytes.

D.

Configure Platinum system class and specify an MTU value of 9100 bytes.

Answers
Suggested answer: C

Explanation:

To meet the requirements of configuring a QoS policy on Cisco UCS that includes a no-drop class and enables jumbo frames without fragmentation, a QoS system class must be created with an MTU value of 9216 bytes. This MTU size is large enough to support jumbo frames, which can carry more data than standard frames, reducing the number of frames sent and improving network efficiency. The no-drop class ensures that frames are not dropped, which is crucial for certain types of traffic that require reliable delivery, such as storage traffic.

Total 491 questions
Go to page: of 50