Exam Logo

Cisco (350-601-DCCOR) Exam Questions And Answers page 12

A customer reports Fibre Channel login requests to a Cisco MDS 9000 Series Switch from an unauthorized source. The customer requires a feature that will allow all devices already logged in and learned to be added to the Fibre Channel active database. Which two features must be enabled to accomplish this goal? (Choose two.)
Storage Networking Security
An infrastructure architect is analyzing the deployment type for an application. Several companies must be able to operate the application environment and integrate it with a third-party protocol. The development team also must have maximum control over their development environment, including the operating system used, Python interpreter, and corresponding libraries. Which cloud deployment solution meets these requirements?
Data Center Infrastructure Network Virtualization
Which configuration generates a syslog message when CPU utilization is higher than 60%?
Compute Security

An engineer must use the python module in the guest shell of the Cisco Nexus 9000 Series switch to shutdown port Ethernet 1/4. Which command set will accomplish this?
Network Virtualization Security

Refer to the exhibit. A network engineer must configure port E1/31-32 to forward only storage server traffic of VLAN 200 on Cisco fabric interconnects A and B. Port E1/31-32 is not reserved for any other traffic. Which port type must be configured to accomplish this goal?
Storage Networking Compute
An engineer must configure HTTPS secure management for Cisco UCS Manager using a key ring named kr2016 and a key size of 1024 bits. The environment consists of a primary fabric interconnect named UCS-A and a secondary fabric interconnect named UCS-B. Which command sequence must be used to accomplish this goal?
Network Virtualization Security
Which service profile is affected if the default host firmware policy in Cisco UCS Manager is changed?
Compute Automation
An engineer is using REST API calls to configure the Cisco APIC. Which data structure must be used within a POST message to receive a login token?
Network Virtualization Security

Refer to the exhibit. What happens to the broadcast traffic when it reaches aggregation switches?
Network Virtualization Compute
Refer to the exhibit.


The STP priority of N7K-1 and N7K-2 are the lowest in the network.

Which statement describes STP on the vPC?
Network Virtualization Compute