350-601 VOL1 Flashcards
Which conditions must be fulfilled for implementing NX-API Client Certificate Authentication?
B. The NX-API client must be configured with a user name and password.
As an administrator, you need to configure cryptographic algorithm in your environment. Select
the algorithms that are supported. (Choose two)
A. HMAC-SHA1-20
C. HMAC-SHA-256
You have been assigned a task to configure Dynamic Arp Inspection on a switch in your data
center. Select the correct answer from the below options regarding the default settings.
B. Dynamic Arp inspection is disabled by default
Select the command from the below options that you would run to verify the DHCP binding.
D. show ip dhcp snooping binding
Why is micro-segmentation important in Data center environment?
C. It minimizes the segment size and provides lesser exposure for lateral movement.
What are the various ways through which ACI can manage the entire DC fabric; both on-prem
and off-prem? Select all applicable answers.
A. Web UI
C. CLI
E. API
Security is the biggest concern for any datacenter. As a network administrator, what are the three
critical needs in datacenter security? (choose three)
B. Segmentation
C. Threat protection
F. Visibility
What are the various privilege type for each roles supported by APIC? (choose three)
A. No access
B. Read-only
D. Read-write
What is the command you will use along with MAC address filter to allow filtering for unicast
addresses only?
B. Set cam filter
When importing a Guest Shell rootfs, which requirement must be fulfilled?
A. We must configure to allow unsigned packages before enabling guestshell
By default, the Guestshell is a 64-bit execution space. If 32-bit support is needed, which package
can be dnf installed by the Data center engineer/
B. glib.i686
Which of the statement is true regarding bash shell and guest shell as hosting environments for
installing packages in Open NX-OS? (Choose Two)
A. Bash shell: this is the native Open NX-OS Linux environment. It is disabled by default.
D. Guest shell: this is a secure Linux container environment running CentOS 7
As an administrator, you are assigned a task to configure keychain management in your
datacenter. Select the right answer from the below options.
A. For IOS XR software release 7.1.2 and later, you must configure the session with a FIPSapproved
cryptographic algorithm.
Which automation tool based on declarative resource-based language that means a user
describes a desired final state rather than describing a series of steps to execute.
B. Puppet
Which automation tool based on declarative resource-based language means a user
describes a desired final state rather than describing a series of steps to execute.
B. Puppet
Which is the Cisco provided GUI tool to help us both Day Zero provision (POAP) as well as upgrade
your Nexus switches?
C. IGNITE
As an administrator, you have been assigned a task to implement storage in your network. Please
select the correct design consideration from the below options.
A. Port channels or trunking is possible to combine multiple storage uplink ports that provide
physical link redundancy.
If the switch is in a network that uses an HTTP proxy server, which environment variables must
be set up within the Guest Shell? (Choose two)
B. http_proxy
E. https_proxy
An ISSU may be disruptive if you have configured features that are not supported on the new
software image. To determine the ISSU compatibility, which command will you use?
B. Show incompatibility system