Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Cisco CCNP Data Center 350-601 Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions
Questions # 11:

An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)

Options:

A.

Add a trusted root LDAP certificate to Cisco Intersight.


B.

Add a trusted OAuth token to Cisco Intersight.


C.

Enable Encryption for LDAP.


D.

Enable Certificate Signing Request in Cisco Intersight.


E.

Add a self-signed LDAP certificate to Cisco Intersight.


Expert Solution
Questions # 12:

Question # 12

Refer to the exhibit. An engineer is implementing an ERSPAN configuration to mirror web server traffic connected to N7K-2. Which ERSPAN configuration must be applied on N7K-1 to forward traffic to the network analyzer?

Question # 12

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Questions # 13:

An engineer is implementing VSAN 10 on multiple Cisco Nexus 5600 Series Switches and must ensure that the full zone set and active zone set are identical across the fabric. Which configuration must be implemented to meet this requirement?

Options:

A.

switch(config)# zoneset distribute vsan 10


B.

switch(config)#zoneset activate name ZONE10 vsan 10


C.

switch(conftg)# zoneset distribute full vsan 10


D.

switch(config)# zone-attribute-group name ATTR1 vsan 10


Expert Solution
Questions # 14:

Question # 14

Question # 14

Refer to the exhibit. An FCoE-attached storage connects to a Cisco Nexus 9000 Series Switch on interface ethernet1/12. After the configuration was performed. VSAN 200 failed to activate on the vfc interface. Which configuration action must be performed to bring up VSAN 200?

Options:

A.

Configure interface vfc 10 as a node port.


B.

Trunk the FCoE VLAN on interface vfc 10.


C.

Change the native VLAN on the trunk port.


D.

Bind VSAN 200 on interface ethernet1/12.


Expert Solution
Questions # 15:

An engineer must integrate Cisco ACI with VMware vCenter The visualization team configured the necessary port groups and assigned them to virtual machines through VMware vCenter The final port group configuration must be protected from being changed by Cisco APIC Which action accomplishes these goals'?

Options:

A.

Create the VMM domain with switch mode set to AVE


B.

Set the VMM domain access mode to Read Only Mode.


C.

Activate CDP and LLDP m the VMM domain


D.

Configure the VMM domain with tag collection.


Expert Solution
Questions # 16:

An engineer installed a new Nexus switch with the mgm0interface in vrf management. Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS. Which command tests connectivity from the shell of the NX-OS?

Options:

A.

[guestshell@guestshell -]$ ping 173.37.145.84 vrf management


B.

[guestshell@guestshell -]$ chvrf management ping 173.37.145.84


C.

[guestshell@guestshell -]$ iping vrf management Ip 173.37.145.84


D.

[guestshell@guestshell -]$ dohost "ping vrf management 173.37.145.84"


Expert Solution
Questions # 17:

An engineer is implementing the Cisco ACI fabric and must create two different vPCs from leaf switches A and B. The vPCs are deployed as follows:

    vPC 1 encompasses ports Eth 1 /1 on leaf A and B and connects to server 1.

    vPC 2 encompasses port Eth1/2 on leaf A and B and connects to server 2.

A leaf switch profile listing leaves A and B is already configured Which ACI object must be created to meet these requirements?

Options:

A.

two vPC interface policy groups


B.

one access port interface policy group


C.

two PortChannel interface policy groups


D.

one vPC interface policy group


Expert Solution
Questions # 18:

An engineer must back up the Cisco UCS Manager configuration to a remote server. The backup job must meet these requirements:

    The backup must use the TCP protocol and be secure.

    Client identification does not need to be verified before data is transmitted

    The backup must contain the system configuration, including usernames, roles, and locales.

    The operations team requires that the backup file is in a human-readable format.

Which set of configurations should the engineer use?

Options:

A.

Type: Full state

Protocol: SCP


B.

Type: System configuration

Protocol: SFTP


C.

Type: All configuration

Protocol: SCP


D.

Type: Logical configuration

Protocol: SFTP


Expert Solution
Questions # 19:

What are two capabilities of the Cisco Network Assurance

Engine? (Choose two.)

Options:

A.

It validates that devices comply with network security policies.


B.

It predicts the network load on a data center.


C.

It verifies the speed of network packet flows by using telemetry.


D.

It predicts the impact of changes to the network.


E.

It ensures that network performance meets an SLA.


Expert Solution
Questions # 20:

Question # 20

Refer to the exhibit. An engineer implements an FCoE Unified Fabric where vPC exists between N9K-A and N9K-B. To avoid rate discards, bandwidth must be regulated to account for sent traffic that exceeds the access speed. Which set of commands completes the configuration?

A)

Question # 20

B)

Question # 20

C)

Question # 20

D)

Question # 20

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 11-20 out of questions