Exam Logo

Cisco (350-601-DCCOR) Exam Questions And Answers page 3

An engineer is asked to use SaaS to manage Cisco computing.

Which two items are needed to accomplish the task? (Choose two.)
Compute Security
An engineer is running an ACI fabric, has VMM integration with VMware vCenter, and wants to enable microsegmentation based on vCenter VM attributes.

Which statement describes microsegmentation in this scenario?
Network Virtualization Security
A customer undergoes an IT security review assessment. The auditor must have read-only access to the Cisco Nexus 9000 Series Switch to perform the configuration review. The customer implements this security role for the auditor:

role name audit
rule 1 permit command *
rule 2
- Output omitted --
username auditor password C4SAFF1B05EB1968$c0 role audit

Which configuration snippet must complete the configuration?
Network Virtualization Security
An engineer must build a lab replica of a Cisco UCS production environment. The file must be imported into a new Cisco UCS cluster using a Cisco UCS Manager GUI. The file must be in XML format and be exported from Cisco UCS Manager using an encrypted method. Which two configuration parameters should be selected to meet these requirements? (Choose two.)
Network Virtualization Compute

Refer to the exhibit. An engineer must monitor all LAN traffic on Fabric A from a blade server. Which source should be configured in the test-span monitor session to complete this task?
Network Virtualization Compute
A network engineer configures a converged network adapter (CNA) and must associate a virtual Fibre Channel 7 interface to VSAN 7. The CNA is connected to the interface Eth1/7, and VLAN 700 is mapped to the VSAN. Which configuration must be applied to create the virtual Fibre Channel interface and associate it with the Ethernet physical interface?
Network Virtualization Storage Networking

Refer to the exhibit. VLAN 10 is experiencing delays and packet drops when the traffic is forwarded through the switch. The destination flow analyzer accepts traffic captures of not more than 30 seconds. Which configuration implements the traffic capture that meets the requirements?
Network Virtualization Compute
Refer to the exhibit.

Which statement about the default gateway configuration of the vPC is true?
Network Virtualization Security
What is an advantage of NFS as compared to Fibre Channel?
Network Virtualization Storage Networking

Refer to the exhibit. A network engineer requires remote access via SSH to a Cisco MDS 9000 Series Switch. The solution must support secure access using the local user database when the RADIUS servers are unreachable from the switches. Which command meets these requirements?
Storage Networking Security