Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Cisco 350-601 - Implementing Cisco Data Center Core Technologies (350-601 DCCOR)

Page: 3 / 12
Total 382 questions

Which Cisco Nexus Dashboard feature analyzes flow telemetry data that is streamed from a Cisco Nexus 9000 Series Switch?

A.

Nexus Dashboard Data Broker

B.

Nexus Dashboard Fabric Controller

C.

Nexus Dashboard Insights

D.

Nexus Dashboard Orchestrator

Refer to the exhibit. An engineer must configure a QoS policy that controls only vHBA traffic. Which policy must be used to meet this requirement?

A.

Best Effort

B.

Fibre Channel

C.

Gold

D.

Platinum

What are two capabilities of the Cisco Network Assurance

Engine? (Choose two.)

A.

It validates that devices comply with network security policies.

B.

It predicts the network load on a data center.

C.

It verifies the speed of network packet flows by using telemetry.

D.

It predicts the impact of changes to the network.

E.

It ensures that network performance meets an SLA.

Refer to the exhibit. An engineer must invoke a Python script that alerts the operations team when the router DC-RTR-1 becomes unreachable. Which configuration set accomplishes this task?

A.

track 3 ip sla 10 reachabilityevent name GATEWAY-DOWNevent state downaction cli command routerdown.py

B.

scheduler job name ROUTER-DOWNjob track 9 state downaction 1.0 cli source routerdown.pyschedule 10

C.

event scheduler name DOWN-ROUTERevent track 2 state 1 not upevent action 1.0 command source routerdown.pyevent start 0:00 repeat 0:05

D.

event manager applet ROUTER-DOWN-SLAevent track 5 state downaction 1.0 event-defaultaction 2.0 cli command source routerdown.py

A cisco mds 9000 series switch must automatically learn about devices and

switches connected to a fibre channel interface. However

a conflicting entry exists in the configuration database.

Which set of actions activates the configuration database?

A.

Enforce port security Disable auto-learning

B.

Activate port security Enable auto-learning

C.

Disable port security Lock down the fabric

D.

Enable auto-learning Activate port security

An engineer must allow communication between the APIC controller and an OpenStack OpFlex agent. The agent Is running on a compute node directly plugged to a Cisco ACI leaf switch The engineer must enable and extend Intra VLAN on the port facing the compute and extend the Infra VLAN to the host. Which action must be taken to meet these requirements?

A.

Add the intra VLAN via the physical domain.

B.

Enable the Infra VLAN on the Attachable Access Entity Profile.

C.

Add the infra VLAN via the VMM domain

D.

Enable the Infra VLAN on the Interface Profile policy.

What is the impact of an electronic programmable logic device upgrade on a Cisco MDS 9000 Series Director Switch with dual supervisors?

A.

A manual reboot is required for each supervisor.

B.

Nondisruptive upgrades without traffic interruptions can be performed.

C.

The upgrade is aborted if any module is unsupported.

D.

A complete system reboot is triggered.

Refer to the exhibit. In a bidirectional PIM network using Phantom RP as an RP redundancy mechanism, two Cisco NX-OS routers have these requirements:

•R1 must be the active RP.

•R2 must be the backup RP that is used only if R1 is not reachable

Drag and drop the configuration steps to complete the configuration for Router 2 Not all configuration steps are used.

In a data center based on Cisco Nexus 9000 Series Switches, all endpoints support explicit congestion notifications How does the Nexus switch respond when the ECN-enabled queue reaches the maximum WRED threshold?

A.

All the outgoing packets are marked.

B.

Low-priority incoming packets are dropped

C.

A congestion notification packet is sent to the sender

D.

A pause frame is sent to the source.

An engineer must back up the Cisco UCS Manager configuration to a remote server. The backup job must meet these requirements:

    The backup must use the TCP protocol and be secure.

    Client identification does not need to be verified before data is transmitted

    The backup must contain the system configuration, including usernames, roles, and locales.

    The operations team requires that the backup file is in a human-readable format.

Which set of configurations should the engineer use?

A.

Type: Full stateProtocol: SCP

B.

Type: System configurationProtocol: SFTP

C.

Type: All configurationProtocol: SCP

D.

Type: Logical configurationProtocol: SFTP