Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

350-601 Exam Dumps - Implementing Cisco Data Center Core Technologies (350-601 DCCOR)

Go to page:
Question # 73

An engineer is configuring a backup operation on the existing Cisco UCS environment using a logical configuration. Which configuration is expected to be saved by using this backup type?

A.

systems

B.

roles

C.

service profiles

D.

servers

Full Access
Question # 74

An engineer is asked to use SaaS to manage Cisco computing. Which two items are needed to accomplish the task? (Choose two.)

A.

UCS Manager

B.

Node name/Serial Number

C.

Device/Claim ID

D.

UCS Central

E.

Intersight

Full Access
Question # 75

An engineer must configure a VDS port group using APIC policy. The requirements are for the frames to be mapped to a particular Layer 2 network and for the virtual machine assigned to the port group to receive all frames passed on the virtual switch. Which two settings must be used to meet these requirements? (Choose two.)

A.

forged transmits

B.

VMDirectPath

C.

port binding

D.

promiscuous mode

E.

VLAN

Full Access
Question # 76

An engineer is implementing security on the Cisco MDS 9000 switch. Drag drop the descriptions from the left onto the correct security features on the right.

Full Access
Question # 77

Which statement about the MAC address that the FCoE Initialization Protocol chooses for use by an E-Node in an FCoE implementation is true?

A.

The FCoE Initialization Protocol uses the burned-in MAC address of the converged network adapter for all FCoE operations.

B.

The FCoE Initialization protocol uses a 24-bit FC-MAP and concatenates a 24-bit Fibre Channel ID to create a fibric-provided MAC address.

C.

The FCoE Initialization Protocol uses 01.00.0C as the first 24 bits of the MAC address and appends a 24-bit Fibre Channel ID to derive a full 48-bit FCoE MAC address.

D.

FCoE does not use a MAC address. The FCoE Initialization Protocol is used to acquire a Fibre Channel ID, and the address is used for all FCoE communications in the same way as Fibre Channel Protocol.

Full Access
Question # 78

An engineer must perform a backup and restore in Cisco UCS to rebuild the system in a disaster recovery scenario. The backup file must be encrypted to prevent the passwords from being stored as clear text. Which backup configuration meets these requirements?

A.

Full state backup over TFTP

B.

Logical configuration backup over SCP

C.

System configuration backup over FTP

D.

All configuration backup over SFTP

Full Access
Question # 79

Refer to the exhibit.

All switches are configured with the default OSPF priority. Which configuration should be applied to ensure that the SW2 Cisco Nexus switch controls the LSA floods and advertises the network to the remaining nodes in the OSPFv2 area?

A.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 255

B.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 1

C.

SW2# configure terminal SW2 (config)# router ospf 1 SW2 (config-router)# router-id 10.10.10.22

D.

SW2# configure terminal SW2 (config)# interface ethernet 1/1 SW2 (config-if)# ip ospf priority 0

Full Access
Question # 80

Drag and drop the Hyperflex characteristics from the left onto the appropriate Hyper Hex node types on the right.

Full Access
Go to page: