Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
350-601
Free trial
Verified
Question 26
Refer to the exhibit. Which type of backup is required to restore a Cisco UCS configuration?
- A: system configuration
- B: all configuration
- C: full state
- D: logical configuration
Question 27
Which server policy is used to install new Cisco IMC software on a server?
- A: hypervisor firmware policy
- B: host firmware policy
- C: BIOS software policy
- D: Cisco IMC software policy
Question 28
What are two requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three Cisco HX240c M5 Series servers? (Choose two.)
- A: If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.
- B: This cluster deployment type must support a mix of HDD and SSD.
- C: The servers must be discovered, unassociated, and connected to each fabric interconnect.
- D: If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.
- E: The hypervisors must be installed to Cisco FlexFlash SD cards.
Question 29
Refer to the exhibit. Service degradation is reported on a VM that is deployed on a Cisco UCS B-Series Server. The traffic from the vNIC is required to SPAN in both directions to a packet analyzer that is connected to UCS-A slot 2 port 12. Which two commands are needed to complete the configuration? (Choose two.)
- A: UCS-A /org/service-profile/vnic/mon-src* # set direction receive transmit
- B: UCS-A /eth-traffic-mon/fabric/eth-mon-session* # create dest-interface 2 12
- C: UCS-A /eth-traffic-mon/fabric/eth-mon-session # activate
- D: UCS-A /eth-traffic-mon/fabric/eth-mon-session* # create eth-mon-session/dest-interface 2 12
- E: UCS-A /org/service-profile/vnic/mon-src* # set direction both
Question 30
An engineer updated firmware on Fabric Interconnects and activates it. However, the endpoint fails to boot from the new firmware image. What is expected to occur in this case?
- A: The system defaults to and boots into kickstart image
- B: The system defaults to and boots into GOLD firmware image
- C: The system defaults to the GOLD firmware image
- D: The system defaults to the backup image version
Question 31
Which service profile is affected if the default host firmware policy in Cisco UCS Manager is changed?
- A: any service profile that uses the global-default host firmware policy
- B: any service profile that uses a user-created host firmware policy
- C: any service profile that has no host firmware policy defined
- D: any service profile that is not in the root sub-org
Question 32
An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)
- A: Enable Certificate Signing Request in Cisco Intersight
- B: Add a trusted root LDAP certificate to Cisco Intersight
- C: Enable Encryption for LDAP
- D: Add a self-signed LDAP certificate to Cisco Intersight
- E: Add a trusted OAuth token to Cisco Intersight
Question 33
Due to a domain name change at a customer site, a Cisco UCS cluster must be renamed. An engineer must recommend a solution to ensure that the Cisco UCS
Manager is available over HTTPS.
Which action accomplishes this goal?
- A: Regenerate the default key ring certificate manually
- B: Reinstall the cluster to generate the default key ring certificate
- C: Reboot the SSO component of the Cisco UCS Manager
- D: Generate a new default key ring certificate from the Cisco UCS Manager
Question 34
An engineer needs to make an XML backup of Cisco UCS Manager. The backup should be transferred using an authenticated and encrypted tunnel, and it should contain all system and service profiles configuration. Which command must be implemented to meet these requirements?
- A: copy running-config scp://user@host35/backups/all-config9.bak all-configuration
- B: create backup scp://user@host35/backups/all-config9.bak all-configuration
- C: create file scp://user@host35/backups/all-config9.bak all-configuration
- D: copy startup-config scp://user@host35/backups/all-config9.bak all-configuration
Question 35
Refer to the exhibit.
What is configured as a result of running these commands?
- A: loose unicast RPF
- B: strict unicast RPF
- C: IP Source Guard
- D: reverse lookup for outbound packets
Question 36
A network architect considers a Cisco HyperFlex design solution for a company. The proposed solution is for a virtual environment that is not performance- sensitive, but the solution must have high storage capacity and a low cost. Which Cisco HyperFlex storage configuration should be used?
- A: Hybrid
- B: All-SAN
- C: All-NVMe
- D: All-Flash
Question 37
The Cisco Nexus 5600 Series Switch experiences occasional packet drops on interface ethernet 1/16. An engineer wants to implement a SPAN session to investigate the issue further. The network analyzer to which the packets must be directed is located on interface 1/3. The analyzer is limited on disk space available for traffic capture, so the Cisco Nexus Switch should send only the relevant data. Which two command sets configure the SPAN session that meets these requirements? (Choose two.)
A.
B.
C.
D.
E.
Question 38
An engineer needs to monitor ingress traffic that arrives at interface Ethernet 1/3 that belongs to a Cisco Nexus 5600 Series Switch. The traffic analyzer machine located at interface Ethernet 1/5 is already monitoring other production, and the traffic analyzer must not be impacted by the traffic captured from the interface
Eth1/3. The operations team allocated a traffic budget for the new monitoring session of 1 Gbps to meet this requirement. Which set of commands configures the
SPAN session?
A.
B.
C.
D.
Question 39
An engineer needs to perform a backup of user roles and locales from Cisco UCS Manager to replicate the setting to a different fabric interconnect. The engineer wants to review the file before importing it to a target fabric interconnect. Which backup type must be selected to meet these requirements?
- A: logical configuration
- B: full state
- C: system configuration
- D: all configuration
Question 40
An engineer creates a service profile in Cisco UCS Manager and must assign a policy that reboots blades when changes are applied. The changes must be applied only after user acknowledgment. Which two policies must be configured to meet these requirements? (Choose two.)
- A: Reboot Policy
- B: Boot Policy
- C: Power Control Policy
- D: Global Policy
- E: Maintenance Policy
Question 41
A network engineer plans to upgrade the firmware of a Cisco UCS B-Series chassis by using the Auto Install feature. Which component is upgraded during the infrastructure firmware upgrade stage?
- A: Adapter
- B: Cisco IMC
- C: I/O Modules
- D: BIOS
Question 42
An engineer must build a lab replica of a Cisco UCS production environment. The file must be imported into a new Cisco UCS cluster using a Cisco UCS Manager
GUI. The file must be in XML format and be exported from Cisco UCS Manager using an encrypted method. Which two configuration parameters should be selected to meet these requirements? (Choose two.)
- A: Type: Full state
- B: Type: Logical configuration
- C: Protocol: TFTP
- D: Type: All configuration
- E: Protocol: SCP
Question 43
A network engineer must configure a power redundancy policy on a Cisco UCS C-Series Rack Server. The power redundancy must support two power sources being used to power the server. Which configuration should be applied to meet the requirement?
A.
B.
C.
D.
Question 44
A Cisco UCS user called Employee1 accidentally changed the boot policy of the Cisco UCS server at the Cisco UCS Manager root level. This change impacted all service profiles, and their storage connectivity was lost. The system administrator wants to prevent this issue from recurring in the future. The new security policy mandates that access must be restricted up to the organization level and prevent other users from modifying root policies. Which action must be taken to meet these requirements?
- A: Modify the privilege level assigned to the user
- B: Assign users to a specific Cisco UCS locale
- C: Assign the user ג€Employee1ג€ the network-operator role
- D: Define a custom user role and assign it to users
Question 45
A new employee must be granted access to add VLANs into an existing Cisco UCS Manager and configure NTP synchronization with date and time zone settings.
Which two privileges must be granted to the employee to complete the task? (Choose two.)
- A: Service Profile Compute (ls-compute)
- B: Ext LAN Policy (ext-lan-policy)
- C: Service Profile Network Policy (ls-network-policy)
- D: Service Profile Config (ls-config)
- E: Ext LAN Config (ext-lan-security)
Question 46
Which configuration implements static ingress replication?
A.
B.
C.
D.
Question 47
Refer to the exhibits. ESXi-Server is associated to the blade server. A VLAN is added to Trunk-A. The VLAN is missing on the vNIC of ESXi-Server. Which action should be taken to add the VLAN to the vNIC?
- A: Change the template type of Trunk-A to an updating template.
- B: Remove the VLAN from the Trunk-A template and add the VLAN again.
- C: Change the template type of ESXi-Server to an updating template.
- D: Remove both templates and recreate them as updating templates.
Question 48
A network engineer is deploying a Cisco All-Flash HyperFlex solution. Which local storage configuration is required for the operating system and persistent logging?
- A: one solid state drive
- B: two SATA drives
- C: one SATA drive
- D: two solid state drives
Question 49
DRAG DROP -
Drag and drop the fields for configuring a full state backup file of the Cisco UCS Manager from the left onto the descriptions on the right.
Select and Place:
Question 50
An engineer configures an Intersight Virtual Appliance and must claim over 200 targets. The engineer starts the Claim New Target Procedure. The engineer has prepared this initial comma-separated value file to provision the targets:
UCSFI,10.1.1.3,user-1,pwd5516b917
IMC,10.1.1.5/26,user-2,pwdc65b1c43f
HX,10.1.2.1/30,user-3,pwd39913690
UCSD,1.1.1.1.user-4,pwd5003e9d5 -
Which information must be included in the comma-separated value file to provision the targets?
- A: target type, hostname or IP address, user name, password
- B: location, address, name, password
- C: FQDN, AD name, IP address, email
- D: certificate, user name, password, email
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!