70 likes | 85 Views
350-601 Implementing and Operating Cisco Data Center Core Technologies (DCCOR) VOL1
E N D
350-601 Implementing and Operating Cisco Data Center Core Technologies (DCCOR) VOL1 QUESTION NO: 1 Which conditions must be fulfilled for implementing NX-API Client Certificate Authentication? A.The NX-API client should be configured with a user name, password and certificate id. B.The NX-API client must be configured with a user name and password. C.The NX-API client and switch can or can not use the same trustpoint. D.The maximum number of trustpoints supported is 21 for each switch. Answer: B QUESTION NO: 2 As an administrator, you need to configure cryptographic algorithm in your environment. Select the algorithms that are supported. (Choose two) A.HMAC-SHA1-20 B.HMAC-SHA-20 C.HMAC-SHA-256 D.HMAC-SHA1-MD5 Answer: A, C QUESTION NO: 3 You have been assigned a task to configure Dynamic Arp Inspection on a switch in your data center. Select the correct answer from the below options regarding the default settings. A.Interface trust state is set to trusted by default. B.Dynamic Arp inspection is disabled by default. C.Validation check are performed by default. D.ARP acl’s are predefined for non-dhcp environments. Answer: B QUESTION NO: 4 Select the command from the below options that you would run to verify the DHCP binding. © Copyright Prep Solutions Limited, All rights reserved
A.show ip dhcp binding B.show ip snooping binding C.show ip binding dhcp D.show ip dhcp snooping binding Answer: D QUESTION NO: 5 Why is micro-segmentation important in Data center environment? A.It can block the external threats at the perimeter firewall. B.It is a feature that enables the network to be controlled locally only. Hackers can hack it but cannot control it remotely. C.It minimizes the segment size and provides lesser exposure for lateral movement. D.It is not considered secure but it speeds up the communication between hosts. Answer: C QUESTION NO: 6 DRAG DROP the options in the left to the correct option in the right that defines the key functions to achieve micro-segmentation. Answer: © Copyright Prep Solutions Limited, All rights reserved
QUESTION NO: 7 What are the various ways through which ACI can manage the entire DC fabric; both on-prem and off-prem? Select all applicable answers. A. B. C. D. E. Web UI Cisco Prime Access CLI Cisco SecureX API Answer: A, C, E QUESTION NO: 8 Security is the biggest concern for any datacenter. As a network administrator, what are the three critical needs in datacenter security? (choose three) A.Speed B.Segmentation C.Threat protection D.Connectivity E.Accessebility F.Visibility Answer: B, C, F QUESTION NO: 9 © Copyright Prep Solutions Limited, All rights reserved
What are the various privilege type for each roles supported by APIC? (choose three) A.No access B.Read-only C.Write-only D.Read-write E.All-access Answer: A, B, D QUESTION NO: 10 What is the command you will use along with MAC address filter to allow filtering for unicast addresses only? A.Set ip filter B.Set cam filter C.Ip filter <filter_name> D.Cam filter <filter_name> Answer: B QUESTION NO: 11 Two VMs are on the same ESXI host and we want to implement the Intra-EPG Security for them. DRAG DROP the option in the left to the correct sequence in the black spaces in the right. Answer: © Copyright Prep Solutions Limited, All rights reserved
QUESTION NO: 12 When importing a Guest Shell rootfs, which requirement must be fulfilled? A.We must configure to allow unsigned packages before enabling guestshell B."signing level signed" command used before enabling guestshell C.By default Cisco support for unsigned packages D.We can only run this command from within a Guest Shell only and running command outside a switch using NX-API is prohibited. Answer: A QUESTION NO: 13 By default, the Guestshell is a 64-bit execution space. If 32-bit support is needed, which package can be dnf installed by the Data center engineer/ A.mingw-glib2.x86 B.glib.i686 C.glibc.i686 D.glib.xi386 Answer: B QUESTION NO: 14 Which of the statement is true regarding bash shell and guest shell as hosting environments for installing packages in Open NX-OS? (Choose Two) A.Bash shell: this is the native Open NX-OS Linux environment. It is disabled by default. © Copyright Prep Solutions Limited, All rights reserved
B.Bash shell: To enable access, users must explicitly enable the bash shell feature by using certain 3rd party packesges on the switch. C.Guest shell: this is a secure Linux container environment running RedHat 7.5 D.Guest shell: this is a secure Linux container environment running CentOS 7 E.Guest Shell: It is disabled by default. Answer: A, D QUESTION NO: 15 As an administrator, you are assigned a task to configure keychain management in your datacenter. Select the right answer from the below options. A.For IOS XR software release 7.1.2 and later, you must configure the session with a FIPS- approved cryptographic algorithm. B.For IOS XR software release 7.1.2 and later, you can configure the session with a non FIPS- approved cryptographic algorithm. C.If you do not configure the key lifetime, then it is considered to be valid for 1 year from the date of creation. D.DES-SHA is the strongest cryptographic algorithm. Answer: A QUESTION NO: 16 Which automation tool based on declarative resource-based language that means a user describes a desired final state rather than describing a series of steps to execute. A.Ansible B.Puppet C.Chef D.NMCLI Answer: B QUESTION NO: 17 Which is the Cisco provided GUI tool to help us both Day Zero provision (POAP) as well as upgrade your Nexus switches? A.Ansible B.DNAC C.IGNITE © Copyright Prep Solutions Limited, All rights reserved
D.Bash Scripts Answer: C QUESTION NO: 18 As an administrator, you have been assigned a task to implement storage in your network. Please select the correct design consideration from the below options. A.Port channels or trunking is possible to combine multiple storage uplink ports that provide physical link redundancy. B.Northbound storage physical connectivity supports vPCs like LAN connectivity. C.Connect storage though southbound Cisco storage device using Catalyst switches. D.Software configurations including VSANs and zoning is not required for providing access to storage resources. Answer: A QUESTION NO: 19 If the switch is in a network that uses an HTTP proxy server, which environment variables must be set up within the Guest Shell? (Choose two) A.http_proxy_server B.http_proxy C.https_proxy_server D.https_proxy_ip E.https_proxy Answer: B, E QUESTION NO: 20 An ISSU may be disruptive if you have configured features that are not supported on the new software image. To determine the ISSU compatibility, which command will you use? A.Show compatibility system B.Show incompatibility system C.Show running-configuration D.Show license matrix Answer: B © Copyright Prep Solutions Limited, All rights reserved