ExamGecko
Home Home / Cisco / 350-601

Cisco 350-601 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Which two firmware packages are included in the Cisco UCS C-Series Rack-Mount UCS-Managed Server Software bundle? (Choose two.)

A.

system

A.

system

Answers
B.

third-party

B.

third-party

Answers
C.

PSU

C.

PSU

Answers
D.

CIMC

D.

CIMC

Answers
E.

BIOS

E.

BIOS

Answers
Suggested answer: D, E

Explanation:

Options D and E are the correct firmware packages that are included in the Cisco UCS C-Series Rack-Mount UCS-Managed Server Software bundle. The bundle contains the firmware for the CIMC (Cisco Integrated Management Controller) and the BIOS (Basic Input/Output System) of the server. The other options are either not part of the bundle or not applicable for the server.Reference:

Cisco UCS C-Series Rack-Mount Server Software and Firmware Compatibility Matrix for Cisco UCS Manager, Release 4.0 [Cisco UCS Manager], Cisco UCS C-Series Rack-Mount Server Software and Firmware Compatibility Matrix for Cisco UCS Manager, Release 4.0, Cisco UCS C-Series Rack-Mount UCS-Managed Server Software Bundle

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.0 [Cisco Integrated Management Controller], Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.0, Firmware Management

An engineer performs a set of configuration changes for the vPC domain using Session Manager. Which two commands are used to verify the configuration and apply the device changes when no errors are returned? (Choose two)

A.

write

A.

write

Answers
B.

verify

B.

verify

Answers
C.

commit

C.

commit

Answers
D.

checkpoint

D.

checkpoint

Answers
E.

apply

E.

apply

Answers
Suggested answer: C, E

Explanation:

Option C and E are the correct commands to verify the configuration and apply the device changes when no errors are returned using Session Manager. The verify command checks the syntax and validity of the configuration commands, and the apply command applies the configuration changes to the device. The other options are either not related to Session Manager or not required for the task.Reference:

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring Session Manager [Cisco Nexus 9000 Series Switches], Configuring Session Manager, Using Session Manager

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring Session Manager [Cisco Nexus 9000 Series Switches], Configuring Session Manager, Session Manager Commands

What are two requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three HX240c M5 servers? (Choose Two)

A.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

A.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

Answers
B.

The hypervisors must be installed to Cisco FlexFlash SD cards.

B.

The hypervisors must be installed to Cisco FlexFlash SD cards.

Answers
C.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

C.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

Answers
D.

The cluster deployment type must support a mix of HDD and SSD.

D.

The cluster deployment type must support a mix of HDD and SSD.

Answers
E.

The servers must be discovered, unassociated, and connected to each fabric interconnect.

E.

The servers must be discovered, unassociated, and connected to each fabric interconnect.

Answers
Suggested answer: C, E

Explanation:

Option C and E are the correct requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three HX240c M5 servers. Option C states that if the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches, which is true for optimal performance and compatibility. Option E states that the servers must be discovered, unassociated, and connected to each fabric interconnect, which is also true for the cluster installation process. The other options are either false or not applicable for the scenario.Reference:

Cisco HyperFlex Systems Installation Guide for Cisco Intersight, Release 4.0 - Cisco HyperFlex Cluster Installation with Cisco Intersight [Cisco HyperFlex HX Data Platform], Cisco HyperFlex Cluster Installation with Cisco Intersight, Before You Begin

Cisco HyperFlex Systems Installation Guide for Cisco Intersight, Release 4.0 - Cisco HyperFlex Cluster Installation with Cisco Intersight [Cisco HyperFlex HX Data Platform], Cisco HyperFlex Cluster Installation with Cisco Intersight, Install a Cisco HyperFlex Cluster

https://www.cisco.com/c/en/us/td/docs/hyperconverged_systems/HyperFlex_HX_DataPlatformSoftware/

AdminGuide/3_5/ b_HyperFlexSystems_AdministrationGuide_3_5/b_HyperFlexSystems_AdministrationGuide_3_5_chapter_01111.html

An engineer must implement a Cisco UCS system at a customer site. One of the requirements is to implement SAN boot. The storage system maps the source WWPN to a unique LUN. Which method does Cisco recommend to configure the SAN boot?

A.

Create a SAN boot policy in which every initiator is mapped to the same target LUN.

A.

Create a SAN boot policy in which every initiator is mapped to the same target LUN.

Answers
B.

Define the vHBAs as bootable and leave the default values on the target definition.

B.

Define the vHBAs as bootable and leave the default values on the target definition.

Answers
C.

Define the vHBAs as bootable and leave the boot target definition empty.

C.

Define the vHBAs as bootable and leave the boot target definition empty.

Answers
D.

Create a SAN boot policy in which every initiator is mapped to a different target LUN.

D.

Create a SAN boot policy in which every initiator is mapped to a different target LUN.

Answers
Suggested answer: D

Explanation:

Option D is the recommended method to configure the SAN boot when the storage system maps the source WWPN to a unique LUN. This method creates a SAN boot policy in which every initiator is mapped to a different target LUN, which ensures that each server boots from its own LUN and avoids any conflicts or errors. The other options are either incorrect or incomplete for the task.Reference:

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring SAN Boot [Cisco UCS Manager], Configuring SAN Boot, Configuring SAN Boot

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring SAN Boot [Cisco UCS Manager], Configuring SAN Boot, Configuring SAN Boot

An engineer creates a service profile in Cisco UCS Manager and must assign a policy that reboots blades when changes are applied. The changes must be applied only after user acknowledgment. Which two policies must be configured to meet these requirements? (Choose two.)

A.

Boot Policy

A.

Boot Policy

Answers
B.

Global Policy

B.

Global Policy

Answers
C.

Power Control Policy

C.

Power Control Policy

Answers
D.

Maintenance Policy

D.

Maintenance Policy

Answers
E.

Reboot Policy

E.

Reboot Policy

Answers
Suggested answer: C, D

Explanation:

Option D and C are the correct policies that must be configured to meet the requirements. A Maintenance Policy specifies how the changes are applied when a service profile is associated or disassociated with a server or when an updated service profile is applied to a server. A Power Control Policy allows users to select how Cisco UCS Manager should restore power to the servers in a chassis after the chassis loses power.Reference:

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring Maintenance Policies [Cisco UCS Manager], Configuring Maintenance Policies, Configuring Maintenance Policies

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring Power Control Policies [Cisco UCS Manager], Configuring Power Control Policies, Configuring Power Control Policies

A customer data center is configured for distribution of user roles, call home, and NTP. The data center was split into two geographically separate locations called DC1 and DC2. The requirement is for the user role configurations to be distributed in DC1 and for NTP and call home features to be constrained to DC2. Which two configuration sets must be used to meet these requirements? (Choose two.)

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
E.

Option E

E.

Option E

Answers
Suggested answer: B, E

Explanation:

Option B and E are the correct configuration sets that must be used to meet the requirements. Option B enables the user role distribution in DC1 by setting the role distribution policy to enabled and the role distribution scope to global. Option E constrains the NTP and call home features to DC2 by setting the NTP and call home policies to local and assigning them to the DC2 fabric interconnects.Reference:

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring User Role Distribution [Cisco UCS Manager], Configuring User Role Distribution, Configuring User Role Distribution

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring NTP [Cisco UCS Manager], Configuring NTP, Configuring NTP

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring Call Home [Cisco UCS Manager], Configuring Call Home, Configuring Call Home

Refer to the exhibit.

An engineer must distribute all the host ports to use all eight configured FEX uplinks. The solution must minimize disruption if an uplink fails Which action accomplishes this objective?

A.

Set the pinning max-links value to 8

A.

Set the pinning max-links value to 8

Answers
B.

Statically assign each host interface to a fabric uplink

B.

Statically assign each host interface to a fabric uplink

Answers
C.

Change the supported FEX type

C.

Change the supported FEX type

Answers
D.

Configure the eight uplinks in a port channel

D.

Configure the eight uplinks in a port channel

Answers
Suggested answer: A

Explanation:

Option A is the correct action that accomplishes the objective. Setting the pinning max-links value to 8 ensures that all host ports are distributed across all eight configured FEX uplinks, providing optimal bandwidth utilization and redundancy. If an uplink fails, this configuration minimizes disruption by automatically redistributing host ports among the remaining active uplinks.Reference:

Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 9.3(x) - Configuring Fabric Extenders [Cisco Nexus 9000 Series Switches], Configuring Fabric Extenders, Configuring Fabric Extender Pinning

Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 9.3(x) - Configuring Fabric Extenders [Cisco Nexus 9000 Series Switches], Configuring Fabric Extenders, Configuring Fabric Extender Pinning Max-Links

A customer has a requirement for an automation solution that supports periodically acquiring configuration from a centralized server and aligning UCS servers to their desired state. Which open-source tool meets these requirements?

A.

SaltStack

A.

SaltStack

Answers
B.

Terraform

B.

Terraform

Answers
C.

Puppet

C.

Puppet

Answers
D.

Kubemetes

D.

Kubemetes

Answers
Suggested answer: C

Explanation:

Option C is the correct answer. Puppet is an open-source software configuration management tool that is used for deploying, configuring, and managing servers. It allows for the centralized management of various system configurations and aligns UCS servers to their desired state by periodically acquiring configurations from a centralized server.Reference:

Cisco Data Center Core Technologies, Module 5: Data Center Automation and Orchestration, Lesson 5.1: Describe Automation and Orchestration Concepts, Topic 5.1.1: Configuration Management Tools

Cisco Data Center Core Technologies, Module 5: Data Center Automation and Orchestration, Lesson 5.2: Implement Automation and Orchestration, Topic 5.2.2: Implement Puppet

An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)

A.

Enable Encryption for LDAP

A.

Enable Encryption for LDAP

Answers
B.

Add a self-signed LDAP certificate to Cisco Intersight.

B.

Add a self-signed LDAP certificate to Cisco Intersight.

Answers
C.

Enable Certificate Signing Request in Cisco Intersight.

C.

Enable Certificate Signing Request in Cisco Intersight.

Answers
D.

Add a trusted root LDAP certificate to Cisco Intersight

D.

Add a trusted root LDAP certificate to Cisco Intersight

Answers
E.

Add a trusted OAuth token to Cisco Intersight

E.

Add a trusted OAuth token to Cisco Intersight

Answers
Suggested answer: A, D

Explanation:

Option A and D are the correct steps to implement the solution. Enabling encryption for LDAP ensures information integrity and confidentiality during data transmission between systems. Adding a trusted root LDAP certificate to Cisco Intersight establishes a secure connection by validating the authenticity of the LDAP server.Reference:

Cisco Intersight User Guide, Release 1.0 - Configuring Cisco Intersight [Cisco Intersight], Configuring Cisco Intersight, Configuring LDAP Settings

Cisco Intersight User Guide, Release 1.0 - Configuring Cisco Intersight [Cisco Intersight], Configuring Cisco Intersight, Configuring Certificates

Refer to the exhibit.

Refer to the exhibit. VLAN 10 Is experiencing delays and packet drops when the traffic is forwarded through the switch. The destination flow analyzer accepts traffic captures of not more than 30 seconds. Which configuration implements the traffic capture that meets the requirements?

A.

Option A

A.

Option A

Answers
B.

Option B

B.

Option B

Answers
C.

Option C

C.

Option C

Answers
D.

Option D

D.

Option D

Answers
Suggested answer: B

Explanation:

Option B is the correct configuration that implements the traffic capture that meets the requirements. The configuration sets the flow timeout to 30 seconds, which matches the destination flow analyzer's limit. The configuration also enables MAC packet classification and layer 2-switched flow monitoring on the interface ethernet 1/1, which belongs to VLAN 10. This allows the switch to capture the traffic from VLAN 10 and send it to the flow analyzer for troubleshooting.Reference:

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring NetFlow [Cisco Nexus 9000 Series Switches], Configuring NetFlow, Configuring NetFlow

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring NetFlow [Cisco Nexus 9000 Series Switches], Configuring NetFlow, Configuring Layer 2-Switched NetFlow

Total 491 questions
Go to page: of 50