350-601 VOL1 Flashcards

1
Q

Which conditions must be fulfilled for implementing NX-API Client Certificate Authentication?

A

B. The NX-API client must be configured with a user name and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As an administrator, you need to configure cryptographic algorithm in your environment. Select
the algorithms that are supported. (Choose two)

A

A. HMAC-SHA1-20
C. HMAC-SHA-256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have been assigned a task to configure Dynamic Arp Inspection on a switch in your data
center. Select the correct answer from the below options regarding the default settings.

A

B. Dynamic Arp inspection is disabled by default

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Select the command from the below options that you would run to verify the DHCP binding.

A

D. show ip dhcp snooping binding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is micro-segmentation important in Data center environment?

A

C. It minimizes the segment size and provides lesser exposure for lateral movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the various ways through which ACI can manage the entire DC fabric; both on-prem
and off-prem? Select all applicable answers.

A

A. Web UI
C. CLI
E. API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Security is the biggest concern for any datacenter. As a network administrator, what are the three
critical needs in datacenter security? (choose three)

A

B. Segmentation
C. Threat protection
F. Visibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the various privilege type for each roles supported by APIC? (choose three)

A

A. No access
B. Read-only
D. Read-write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the command you will use along with MAC address filter to allow filtering for unicast
addresses only?

A

B. Set cam filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When importing a Guest Shell rootfs, which requirement must be fulfilled?

A

A. We must configure to allow unsigned packages before enabling guestshell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

By default, the Guestshell is a 64-bit execution space. If 32-bit support is needed, which package
can be dnf installed by the Data center engineer/

A

B. glib.i686

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the statement is true regarding bash shell and guest shell as hosting environments for
installing packages in Open NX-OS? (Choose Two)

A

A. Bash shell: this is the native Open NX-OS Linux environment. It is disabled by default.
D. Guest shell: this is a secure Linux container environment running CentOS 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

As an administrator, you are assigned a task to configure keychain management in your
datacenter. Select the right answer from the below options.

A

A. For IOS XR software release 7.1.2 and later, you must configure the session with a FIPSapproved
cryptographic algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which automation tool based on declarative resource-based language that means a user
describes a desired final state rather than describing a series of steps to execute.

A

B. Puppet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which automation tool based on declarative resource-based language means a user
describes a desired final state rather than describing a series of steps to execute.

A

B. Puppet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which is the Cisco provided GUI tool to help us both Day Zero provision (POAP) as well as upgrade
your Nexus switches?

17
Q

As an administrator, you have been assigned a task to implement storage in your network. Please
select the correct design consideration from the below options.

A

A. Port channels or trunking is possible to combine multiple storage uplink ports that provide
physical link redundancy.

18
Q

If the switch is in a network that uses an HTTP proxy server, which environment variables must
be set up within the Guest Shell? (Choose two)

A

B. http_proxy
E. https_proxy

19
Q

An ISSU may be disruptive if you have configured features that are not supported on the new
software image. To determine the ISSU compatibility, which command will you use?

A

B. Show incompatibility system