Cisco (350-601-DCCOR) Exam Questions And Answers page 29
A customer data center is configured for distribution of user roles, call home, and NTP. The data center was split into two geographically separate locations called DC1 and DC2. The requirement is for the user role configurations to be distributed in DC1 and for NTP and call home features to be constrained to DC2. Which two configuration sets must be used to meet these requirements? (Choose two.)
Data Center Infrastructure
Network Virtualization
An engineer is seeking the most optimal on demand CPU performance while configuring the BIOS settings of a UCS C-series rack mount server.
What setting will accomplish this goal?
What setting will accomplish this goal?
C6 Retention
C6 non-Retention
C2 state
C0/C1 state
Compute
Automation
An engineer is converting a Cisco MDS switch to support NPIV mode.
What should be considered when implementing the solution?
What should be considered when implementing the solution?
It requires mapping of external interface traffic.
It must be enabled on VSAN 1 only.
It must be enabled globally on all VSANs.
It requires the FLOGI database to be disabled.
Network Virtualization
Storage Networking
Refer to the exhibit. An engineer must configure FCoE between the N9K-A switch and the FCF-A Nexus 9000 core switch. The deployment has these characteristics:
• The N9K-A and N9K-B top-of-rack switches share the domain ID of the core switches.
• The hosts are equipped with converged network adapters.
• The only VSAN that is used is permitted to traverse port-channel 100 is VSAN 20.
Which configuration completes the FCoE configuration on the N9K-A device?
N9K-A(config)# feature-set fcoe-npv
N9K-A(config)# interface vfc-port-channel 100
N9K-A(config-if)# switchport mode E
N9K-A(config-if)# switchport trunk allowed vsan 1, 20
N9K-A(config)# interface vfc-port-channel 100
N9K-A(config-if)# switchport mode E
N9K-A(config-if)# switchport trunk allowed vsan 1, 20
N9K-A(config)# feature-set fcoe-npv
N9K-A(config)# interface vfc-port-channel 100
N9K-A(config-if)# switchport mode NP
N9K-A(config-if)# switchport trunk allowed vsan 20
N9K-A(config)# interface vfc-port-channel 100
N9K-A(config-if)# switchport mode NP
N9K-A(config-if)# switchport trunk allowed vsan 20
N9K-A(config)# feature fcoe
N9K-A(config)# feature npv
N9K-A(config)# interface vfc 100
N9K-A(config-if)# bind interface port-channel 100
N9K-A(config-if)# switchport mode N
N9K-A(config-if)# switchport trunk allowed vsan 1, 20
N9K-A(config)# feature npv
N9K-A(config)# interface vfc 100
N9K-A(config-if)# bind interface port-channel 100
N9K-A(config-if)# switchport mode N
N9K-A(config-if)# switchport trunk allowed vsan 1, 20
N9K-A(config)# feature fcoe
N9K-A(config)# feature npv
N9K-A(config)# interface vfc 100
N9K-A(config-if)# bind interface port-channel 100
N9K-A(config-if)# switchport mode F
N9K-A(config-if)# switchport trunk allowed vsan 20
N9K-A(config)# feature npv
N9K-A(config)# interface vfc 100
N9K-A(config-if)# bind interface port-channel 100
N9K-A(config-if)# switchport mode F
N9K-A(config-if)# switchport trunk allowed vsan 20
Storage Networking
Security
Which method must a network engineer use to upgrade the BIOS firmware or a Cisco UCS standalone C-Series rack-mount server?
Use the U-ACPI Interface.
Use the Cisco host upgrade utility.
Use the Cisco hardware upgrade utility.
Use the Cisco host firmware policy.
Compute
Security
What is the result of implementing this configuration?
Single Choice
Refer to the exhibit.
What is the result of implementing this configuration?
What is the result of implementing this configuration?
The switch queries the TACACS+ server by using an encrypted text PAP login.
The TACACS+ server uses the type-6 encrypted format.
The switch queries the TACACS+ server by using a clear text PAP login.
The timeout value on the TACACS+ server is 10 seconds.
Storage Networking
Compute
Several production and development database servers exist in the same EPG and IP subnet. The IT security policy is to prevent connections between production and development. Which attribute must be used to assign the servers to different microsegments?
data center
VM name
IP address
VMM domain
Compute
Security
Refer to the exhibit.
What is the reason the system-fm-vrrp checkpoint was created?
What is the reason the system-fm-vrrp checkpoint was created?
The VRRP process crashed and the checkpoint was automatically created.
The VRRP service restarted and the checkpoint was automatically created.
The network administrator manually created it.
The VRRP-enabled feature has been disabled.
Network Virtualization
Security
A customer asks an engineer to develop a framework that will be used to replace the process of the manual device configuration of Cisco NX-OS devices. The engineer plans to use the programmatic interface that meets these requirements:
• The development team is familiar with Windows-based scripting environment using PowerShell.
• The customer s security requirements mandate the use of HTTPS transport.
Which solution must be used to meet these requirements?
• The development team is familiar with Windows-based scripting environment using PowerShell.
• The customer s security requirements mandate the use of HTTPS transport.
Which solution must be used to meet these requirements?
NETCONF-YANG
NX-API
VISORE
Open Agent Container
Automation
Security
An engineer must configure a monitoring solution for a Cisco Nexus 9000 Series Switch based data center. The solution must provide real-time insight into the network health with subscription-based monitoring. The monitoring must be initiated from the client side, and the data must be sent via encryption. Which configuration steps complete the configuration?
Configure Grafana on the Nexus switch.
Specify the logging certificate.
Enable syslog level 7 export to Grafana.
Specify the logging certificate.
Enable syslog level 7 export to Grafana.
Set the telemetry feature on the Nexus switch.
Specify a certificate for telemetry transport.
Configure a sensor group and destination.
Specify a certificate for telemetry transport.
Configure a sensor group and destination.
Activate SNMPv3 on the Nexus switch.
Set the globalEnforcePriv parameter.
Configure an SNMP agent to poll information.
Set the globalEnforcePriv parameter.
Configure an SNMP agent to poll information.
Enable GRPC on the Nexus switch.
Generate a certificate.
Configure gNMI inputs in Telegraf and output to InfluxDB.
Generate a certificate.
Configure gNMI inputs in Telegraf and output to InfluxDB.
Network Virtualization
Security
Comments