ExamGecko
Home / Cisco / 350-601 / List of questions
Ask Question

Cisco 350-601 Practice Test - Questions Answers, Page 5

List of questions

Question 41

Report Export Collapse

Which two firmware packages are included in the Cisco UCS C-Series Rack-Mount UCS-Managed Server Software bundle? (Choose two.)

system

system

third-party

third-party

PSU

PSU

CIMC

CIMC

BIOS

BIOS

Suggested answer: D, E
Explanation:

Options D and E are the correct firmware packages that are included in the Cisco UCS C-Series Rack-Mount UCS-Managed Server Software bundle. The bundle contains the firmware for the CIMC (Cisco Integrated Management Controller) and the BIOS (Basic Input/Output System) of the server. The other options are either not part of the bundle or not applicable for the server.Reference:

Cisco UCS C-Series Rack-Mount Server Software and Firmware Compatibility Matrix for Cisco UCS Manager, Release 4.0 [Cisco UCS Manager], Cisco UCS C-Series Rack-Mount Server Software and Firmware Compatibility Matrix for Cisco UCS Manager, Release 4.0, Cisco UCS C-Series Rack-Mount UCS-Managed Server Software Bundle

Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.0 [Cisco Integrated Management Controller], Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide, Release 4.0, Firmware Management

asked 10/10/2024
Marcel Wienhusen
48 questions

Question 42

Report Export Collapse

An engineer performs a set of configuration changes for the vPC domain using Session Manager. Which two commands are used to verify the configuration and apply the device changes when no errors are returned? (Choose two)

write

write

verify

verify

commit

commit

checkpoint

checkpoint

apply

apply

Suggested answer: C, E
Explanation:

Option C and E are the correct commands to verify the configuration and apply the device changes when no errors are returned using Session Manager. The verify command checks the syntax and validity of the configuration commands, and the apply command applies the configuration changes to the device. The other options are either not related to Session Manager or not required for the task.Reference:

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring Session Manager [Cisco Nexus 9000 Series Switches], Configuring Session Manager, Using Session Manager

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring Session Manager [Cisco Nexus 9000 Series Switches], Configuring Session Manager, Session Manager Commands

asked 10/10/2024
Elizaveta Kutuzova
58 questions

Question 43

Report Export Collapse

What are two requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three HX240c M5 servers? (Choose Two)

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

The hypervisors must be installed to Cisco FlexFlash SD cards.

The hypervisors must be installed to Cisco FlexFlash SD cards.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

The cluster deployment type must support a mix of HDD and SSD.

The cluster deployment type must support a mix of HDD and SSD.

The servers must be discovered, unassociated, and connected to each fabric interconnect.

The servers must be discovered, unassociated, and connected to each fabric interconnect.

Suggested answer: C, E
Explanation:

Option C and E are the correct requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three HX240c M5 servers. Option C states that if the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches, which is true for optimal performance and compatibility. Option E states that the servers must be discovered, unassociated, and connected to each fabric interconnect, which is also true for the cluster installation process. The other options are either false or not applicable for the scenario.Reference:

Cisco HyperFlex Systems Installation Guide for Cisco Intersight, Release 4.0 - Cisco HyperFlex Cluster Installation with Cisco Intersight [Cisco HyperFlex HX Data Platform], Cisco HyperFlex Cluster Installation with Cisco Intersight, Before You Begin

Cisco HyperFlex Systems Installation Guide for Cisco Intersight, Release 4.0 - Cisco HyperFlex Cluster Installation with Cisco Intersight [Cisco HyperFlex HX Data Platform], Cisco HyperFlex Cluster Installation with Cisco Intersight, Install a Cisco HyperFlex Cluster

https://www.cisco.com/c/en/us/td/docs/hyperconverged_systems/HyperFlex_HX_DataPlatformSoftware/

AdminGuide/3_5/ b_HyperFlexSystems_AdministrationGuide_3_5/b_HyperFlexSystems_AdministrationGuide_3_5_chapter_01111.html

asked 10/10/2024
Angela Cappa
39 questions

Question 44

Report Export Collapse

An engineer must implement a Cisco UCS system at a customer site. One of the requirements is to implement SAN boot. The storage system maps the source WWPN to a unique LUN. Which method does Cisco recommend to configure the SAN boot?

Create a SAN boot policy in which every initiator is mapped to the same target LUN.

Create a SAN boot policy in which every initiator is mapped to the same target LUN.

Define the vHBAs as bootable and leave the default values on the target definition.

Define the vHBAs as bootable and leave the default values on the target definition.

Define the vHBAs as bootable and leave the boot target definition empty.

Define the vHBAs as bootable and leave the boot target definition empty.

Create a SAN boot policy in which every initiator is mapped to a different target LUN.

Create a SAN boot policy in which every initiator is mapped to a different target LUN.

Suggested answer: D
Explanation:

Option D is the recommended method to configure the SAN boot when the storage system maps the source WWPN to a unique LUN. This method creates a SAN boot policy in which every initiator is mapped to a different target LUN, which ensures that each server boots from its own LUN and avoids any conflicts or errors. The other options are either incorrect or incomplete for the task.Reference:

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring SAN Boot [Cisco UCS Manager], Configuring SAN Boot, Configuring SAN Boot

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring SAN Boot [Cisco UCS Manager], Configuring SAN Boot, Configuring SAN Boot

asked 10/10/2024
Eduardo Messias Andrade e Oliveira
38 questions

Question 45

Report Export Collapse

An engineer creates a service profile in Cisco UCS Manager and must assign a policy that reboots blades when changes are applied. The changes must be applied only after user acknowledgment. Which two policies must be configured to meet these requirements? (Choose two.)

Boot Policy

Boot Policy

Global Policy

Global Policy

Power Control Policy

Power Control Policy

Maintenance Policy

Maintenance Policy

Reboot Policy

Reboot Policy

Suggested answer: C, D
Explanation:

Option D and C are the correct policies that must be configured to meet the requirements. A Maintenance Policy specifies how the changes are applied when a service profile is associated or disassociated with a server or when an updated service profile is applied to a server. A Power Control Policy allows users to select how Cisco UCS Manager should restore power to the servers in a chassis after the chassis loses power.Reference:

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring Maintenance Policies [Cisco UCS Manager], Configuring Maintenance Policies, Configuring Maintenance Policies

Cisco UCS Manager GUI Configuration Guide, Release 4.0 - Configuring Power Control Policies [Cisco UCS Manager], Configuring Power Control Policies, Configuring Power Control Policies

asked 10/10/2024
Samer Chaar
31 questions

Question 46

Report Export Collapse

A customer data center is configured for distribution of user roles, call home, and NTP. The data center was split into two geographically separate locations called DC1 and DC2. The requirement is for the user role configurations to be distributed in DC1 and for NTP and call home features to be constrained to DC2. Which two configuration sets must be used to meet these requirements? (Choose two.)

Cisco 350-601 image Question 46 116776 10102024233033000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Option E

Option E

Suggested answer: B, E
Explanation:

Option B and E are the correct configuration sets that must be used to meet the requirements. Option B enables the user role distribution in DC1 by setting the role distribution policy to enabled and the role distribution scope to global. Option E constrains the NTP and call home features to DC2 by setting the NTP and call home policies to local and assigning them to the DC2 fabric interconnects.Reference:

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring User Role Distribution [Cisco UCS Manager], Configuring User Role Distribution, Configuring User Role Distribution

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring NTP [Cisco UCS Manager], Configuring NTP, Configuring NTP

Cisco UCS Manager CLI Configuration Guide, Release 4.0 - Configuring Call Home [Cisco UCS Manager], Configuring Call Home, Configuring Call Home

asked 10/10/2024
Mahmoud Ismail
40 questions

Question 47

Report Export Collapse

Refer to the exhibit.

Cisco 350-601 image Question 47 116777 10102024233033000000

An engineer must distribute all the host ports to use all eight configured FEX uplinks. The solution must minimize disruption if an uplink fails Which action accomplishes this objective?

Set the pinning max-links value to 8

Set the pinning max-links value to 8

Statically assign each host interface to a fabric uplink

Statically assign each host interface to a fabric uplink

Change the supported FEX type

Change the supported FEX type

Configure the eight uplinks in a port channel

Configure the eight uplinks in a port channel

Suggested answer: A
Explanation:

Option A is the correct action that accomplishes the objective. Setting the pinning max-links value to 8 ensures that all host ports are distributed across all eight configured FEX uplinks, providing optimal bandwidth utilization and redundancy. If an uplink fails, this configuration minimizes disruption by automatically redistributing host ports among the remaining active uplinks.Reference:

Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 9.3(x) - Configuring Fabric Extenders [Cisco Nexus 9000 Series Switches], Configuring Fabric Extenders, Configuring Fabric Extender Pinning

Cisco Nexus 9000 Series NX-OS Interfaces Configuration Guide, Release 9.3(x) - Configuring Fabric Extenders [Cisco Nexus 9000 Series Switches], Configuring Fabric Extenders, Configuring Fabric Extender Pinning Max-Links

asked 10/10/2024
Komalaharshini Basireddygari
48 questions

Question 48

Report Export Collapse

A customer has a requirement for an automation solution that supports periodically acquiring configuration from a centralized server and aligning UCS servers to their desired state. Which open-source tool meets these requirements?

SaltStack

SaltStack

Terraform

Terraform

Puppet

Puppet

Kubemetes

Kubemetes

Suggested answer: C
Explanation:

Option C is the correct answer. Puppet is an open-source software configuration management tool that is used for deploying, configuring, and managing servers. It allows for the centralized management of various system configurations and aligns UCS servers to their desired state by periodically acquiring configurations from a centralized server.Reference:

Cisco Data Center Core Technologies, Module 5: Data Center Automation and Orchestration, Lesson 5.1: Describe Automation and Orchestration Concepts, Topic 5.1.1: Configuration Management Tools

Cisco Data Center Core Technologies, Module 5: Data Center Automation and Orchestration, Lesson 5.2: Implement Automation and Orchestration, Topic 5.2.2: Implement Puppet

asked 10/10/2024
Ann Nacua
53 questions

Question 49

Report Export Collapse

An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)

Enable Encryption for LDAP

Enable Encryption for LDAP

Add a self-signed LDAP certificate to Cisco Intersight.

Add a self-signed LDAP certificate to Cisco Intersight.

Enable Certificate Signing Request in Cisco Intersight.

Enable Certificate Signing Request in Cisco Intersight.

Add a trusted root LDAP certificate to Cisco Intersight

Add a trusted root LDAP certificate to Cisco Intersight

Add a trusted OAuth token to Cisco Intersight

Add a trusted OAuth token to Cisco Intersight

Suggested answer: A, D
Explanation:

Option A and D are the correct steps to implement the solution. Enabling encryption for LDAP ensures information integrity and confidentiality during data transmission between systems. Adding a trusted root LDAP certificate to Cisco Intersight establishes a secure connection by validating the authenticity of the LDAP server.Reference:

Cisco Intersight User Guide, Release 1.0 - Configuring Cisco Intersight [Cisco Intersight], Configuring Cisco Intersight, Configuring LDAP Settings

Cisco Intersight User Guide, Release 1.0 - Configuring Cisco Intersight [Cisco Intersight], Configuring Cisco Intersight, Configuring Certificates

asked 10/10/2024
Sam K
35 questions

Question 50

Report Export Collapse

Refer to the exhibit.

Cisco 350-601 image Question 50 116780 10102024233033000000

Cisco 350-601 image Question 50 116780 10102024233033000000

Refer to the exhibit. VLAN 10 Is experiencing delays and packet drops when the traffic is forwarded through the switch. The destination flow analyzer accepts traffic captures of not more than 30 seconds. Which configuration implements the traffic capture that meets the requirements?

Cisco 350-601 image Question 50 116780 10102024233033000000

Option A

Option A

Option B

Option B

Option C

Option C

Option D

Option D

Suggested answer: B
Explanation:

Option B is the correct configuration that implements the traffic capture that meets the requirements. The configuration sets the flow timeout to 30 seconds, which matches the destination flow analyzer's limit. The configuration also enables MAC packet classification and layer 2-switched flow monitoring on the interface ethernet 1/1, which belongs to VLAN 10. This allows the switch to capture the traffic from VLAN 10 and send it to the flow analyzer for troubleshooting.Reference:

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring NetFlow [Cisco Nexus 9000 Series Switches], Configuring NetFlow, Configuring NetFlow

Cisco Nexus 9000 Series NX-OS System Management Configuration Guide, Release 9.3(x) - Configuring NetFlow [Cisco Nexus 9000 Series Switches], Configuring NetFlow, Configuring Layer 2-Switched NetFlow

asked 10/10/2024
Cesar Paredes
34 questions
Total 491 questions
Go to page: of 50
Search

Related questions