Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
  • Login
  • Register
Quesions Library
  • Cisco
    • 200-301
    • 200-901
      • Multiple Choice
      • Drag Drop
    • 350-401
      • Multiple Choice
      • Drag Drop
    • 350-701
    • 300-410
      • Multiple Choice
      • Drag Drop
    • 300-415
      • Multiple Choice
      • Drag Drop
    • 300-425
    • Others
  • AWS
    • CLF-C02
    • SAA-C03
    • SAP-C02
    • ANS-C01
    • Others
  • Microsoft
    • AZ-104
    • AZ-204
    • AZ-305
    • AZ-900
    • AI-900
    • SC-900
    • Others
  • CompTIA
    • SY0-601
    • N10-008
    • 220-1101
    • 220-1102
    • Others
  • Google
    • Associate Cloud Engineer
    • Professional Cloud Architect
    • Professional Cloud DevOps Engineer
    • Others
  • ISACA
    • CISM
    • CRIS
    • Others
  • LPI
    • 101-500
    • 102-500
    • 201-450
    • 202-450
  • Fortinet
    • NSE4_FGT-7.2
  • VMware
  • >>
    • Juniper
    • EC-Council
      • 312-50v12
    • ISC
      • CISSP
    • PMI
      • PMP
    • Palo Alto Networks
    • RedHat
    • Oracle
    • GIAC
    • F5
    • ITILF
    • Salesforce
Contribute
Practice Test Free
  • QUESTIONS
  • COURSES
    • CCNA
    • Cisco Enterprise Core
    • VMware vSphere: Install, Configure, Manage
  • CERTIFICATES
No Result
View All Result
Practice Test Free
No Result
View All Result
Home Mock Test Free

350-601 Mock Test Free

Table of Contents

Toggle
  • 350-601 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.
  • Access Full 350-601 Mock Test Free

350-601 Mock Test Free – 50 Realistic Questions to Prepare with Confidence.

Getting ready for your 350-601 certification exam? Start your preparation the smart way with our 350-601 Mock Test Free – a carefully crafted set of 50 realistic, exam-style questions to help you practice effectively and boost your confidence.

Using a mock test free for 350-601 exam is one of the best ways to:

  • Familiarize yourself with the actual exam format and question style
  • Identify areas where you need more review
  • Strengthen your time management and test-taking strategy

Below, you will find 50 free questions from our 350-601 Mock Test Free resource. These questions are structured to reflect the real exam’s difficulty and content areas, helping you assess your readiness accurately.

Question 1

Image
Refer to the exhibit. An engineer is troubleshooting intermittent connect issues between the client PC and the DHCP server. What does the last package captured from the Cisco Nexus 2000 Series Switch indicate?

A. The client receives an IP address from the DHCP server.

B. The DHCP server sends an IP address via a broadcast message.

C. The client sends a unicast message to receive an IP address from the DCHP server.

D. The DCHP server releases the IP address from the client.

 


Suggested Answer: D

 

 

Question 2

DRAG DROP -
Drag and drop the characteristics from the left onto the NAS protocols on the right. Some characteristics are used more than once.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 3

A network engineer is configuring the Cisco UCS service profile template with Ansible using this code: hostname: 192.168.10.23 username: cisco password: f718c4329405726531f6247ff982 name: DCE-CTRL template_type: updating-template uuid_pool: UUID-POOL storage_pronte: DCE-StgProf maintenance_policy: default server_pool: Container-Pool host_firmware_package: 4.1(1a) bios_policy: Docker
Which attribute must be used to apply the iSCSI initiator identifiers to all iSCSI vNICs for the service profiles derived from the service template?

A. san_connectivity_policy

B. lan_connectivity_policy

C. boot_policy

D. iqn_pool

 


Suggested Answer: D

An IQN pool is a collection of iSCSI Qualified Names (IQNs) for use as initiator identifiers by iSCSI vNICs in a Cisco UCS domain. IQN pools created in Cisco
UCS Central can be shared between Cisco UCS domains.
Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-central/GUI-User-Guides/Server-Mgmt/1-5/
b_CiscoUCSCentral_Server_Management_Guide_1-5/b_CiscoUCSCentral_Server_Management_Guide_1-5_chapter_0101.html

 

Question 4

A network engineer must restore the running configuration on a Cisco Nexus 5000 Series Switch to an existing snapshot called `stable1`. The restore procedure should proceed only if no errors occur. Which configuration should be used to accomplish this goal?

A. rollback running-config checkpoint stable1 best-effort

B. rollback running-config checkpoint stable1 atomic

C. rollback checkpoint stable1 best-effort running-config best-effort

D. rollback checkpoint stable1 best-effort running-config atomic

 


Suggested Answer: B

 

 

Question 5

What are two requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three Cisco HX240c M5 Series servers? (Choose two.)

A. If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

B. This cluster deployment type must support a mix of HDD and SSD.

C. The servers must be discovered, unassociated, and connected to each fabric interconnect.

D. If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

E. The hypervisors must be installed to Cisco FlexFlash SD cards.

 


Suggested Answer: CD

Reference:
https://www.cisco.com/c/en/us/td/docs/hyperconverged_systems/HyperFlex_HX_DataPlatformSoftware/AdminGuide/3_5/
b_HyperFlexSystems_AdministrationGuide_3_5/b_HyperFlexSystems_AdministrationGuide_3_5_chapter_01111.html

 

Question 6

A network administrator attempts to automate the provisioning of several new Cisco Nexus switches. The administrator prepares a bootstrap configuration script for the task. Due to the number of switches, a zero-touch provisioning solution is preferred. Additionally, some switches arrive with outdated software and should be automatically upgraded as part of the provisioning workflow. Which solution meets the requirements?

A. Ansible

B. NX-API

C. POAP

D. DHCP

 


Suggested Answer: C

 

 

Question 7

DRAG DROP -
Drag and drop the firmware packages from the left onto the software bundles they belong to on the right.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 8

Image
Refer to the exhibit. What is the result of executing this Python code?

A. It sends the switch configuration to Cisco TAC

B. It sends a Cisco device backup to a remote destination

C. It schedules a backup on a Cisco switch using EEM

D. It backs up Cisco switches to Cisco Prime Infrastructure

 


Suggested Answer: B

This will send a copy of the running configuration to an FTP server at 10.83.249.182.

 

Question 9

Image
 Image
Refer to the exhibit. A network engineer must monitor the traffic from the server on VLAN 80. All source traffic from the server must be captured on the monitoring device. Which configuration set meets these requirements?

A. switch(config-monitor)# destination interface ethernet 1/1switch(config-monitor)# source vlan 80

B. switch(config-monitor)# destination interface ethernet 1/1switch(config-monitor)# filter vlan 80

C. switch(config-monitor)# destination interface ethernet 1/2switch(config-monitor)# filter vlan 80 rx tx

D. switch(config-monitor)# destination interface ethernet 1/2switch(config-monitor)# source vlan 80 rx

 


Suggested Answer: A

 

 

Question 10

What are two capabilities of the Cisco Network Assurance Engine? (Choose two.)

A. It validates that devices comply with network security policies.

B. It predicts the impact of changes to the network.

C. It predicts the network load on a data center.

D. It ensures that network performance meets an SLA.

E. It verifies the speed of network packet flows by using telemetry.

 


Suggested Answer: AB

With Cisco Network Assurance Engine operators can:
ג— Predict the impact of network changes: Proactively verify changes made to the network for correctness to drive increased change agility while significantly reducing the risk of network failures induced by human error.
ג— Verify network-wide behavior: Continuously analyze and verify the dynamic state of the network against intent and policy to ensure connectivity and eliminate potential network outages and vulnerabilities before any business impact occurs.
ג— Ensure network security policy and compliance: Ensure network security policies and check for compliance against business rules to reduce security risk and achieve provable continuous compliance by policy and state.
Reference:
https://www.cisco.com/c/en/us/products/collateral/data-center-analytics/network-assurance-engine/at-a-glance-c45-740230.html

 

Question 11

DRAG DROP
-
Refer to the exhibit.
 Image
Drag and drop the code snippets from the bottom onto the blanks in the code to complete the JSON request that implements the ACL presented. Not all code snippets are used.
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 12

A customer reports Fibre Channel login requests to a Cisco MDS 9000 Series Switch from an unauthorized source. The customer requires a feature that will allow all devices already logged in and learned to be added to the Fibre Channel active database. Which two features must be enabled to accomplish this goal?
(Choose two.)

A. auto-learning

B. smart aliases

C. port security

D. enhanced zoning

E. device aliases

 


Suggested Answer: DE

By default, the port security feature is not activated in any switch in the Cisco MDS 9000 Family.
By activating the port security feature, the following apply:
ג€¢ Auto-learning is also automatically enabled, which means:
ג€” From this point, auto-learning happens only for the devices or interfaces that were not logged into the switch.
ג€” You cannot activate the database until you disable auto-learning.
ג€¢ All the devices that are already logged in are learned and are added to the active database.
ג€¢ All entries in the configured database are copied to the active database.
After the database is activated, subsequent device login is subject to the activated port bound WWN pairs, excluding the auto-learned entries. You must disable auto-learning before the auto-learned entries become activated.
When you activate the port security feature, auto-learning is also automatically enabled. You can choose to activate the port security feature and disable auto- learning.
Reference:
https://www.cisco.com/en/US/docs/storage/san_switches/mds9000/sw/rel_3_x/configuration/guides/fm_3_3_1/psec.html

 

Question 13

Image
Refer to the exhibit. An engineer must upgrade the N9K_2 device to the latest code. In preparation for the upgrade, the engineer wants to divert all data plane traffic between RTR_1 and RTR_2 to N9K_4 and N9K_5. The traffic redirection must happen without forcing any OSPFv2 adjacency change in the network. Which configuration set must be used on N9K_2 OSPF process 1 to accomplish these goals?

A. area 0 stub no-summary

B. passive-interface default

C. max-metric router-lsa

D. area 0 filter-list route-map DENY_ALL out

 


Suggested Answer: C

 

 

Question 14

Which mroute state is created when Bidirectional PIM is deployed at a site?

A. *,G

B. MVPN Type-6

C. MVPN Type-7

D. S,G

 


Suggested Answer: A

Bidirectional PIM is a different flavor of multicast than what you are probably used to (sparse, dense and sparse-dense mode). Most multicast networks have a couple of sources and many receivers. Bidirectional PIM has been invented for networks where we have many sources and receivers talking to each other. An example of this is videoconferencing where it’s not just 1 source with many listeners but all the participants are communicating with each other.
The downside of using PIM sparse mode with many active sources and receivers is that we will see many mroute state entries that can take quite some resources. Using PIM sparse mode the RP builds 2 entries:
(*,G)
(S,G)
When we use PIM bidirectional mode the RP will never build a (S,G) entry and we only allow the (*,G) entry for the shared tree. PIM routers will never build the
SPT (Shortest Path Tree) towards the source.
Reference:
https://networklessons.com/multicast/multicast-bidirectional-pim

 

Question 15

Which data structure results from running this Python code?
 Image

A. tuple

B. dictionary

C. set

D. list

 


Suggested Answer: B

Reference:
https://www.geeksforgeeks.org/read-json-file-using-python/

 

Question 16

What is a feature of an electronic programmable logic device upgrade on a Cisco MDS 9000 Series Switch?

A. Only the modules that are being upgraded are disrupted.

B. An EPLD upgrade is disruptive on all modules.

C. The standby supervisor module can perform the upgrade.

D. An EPLD upgrade is nondisruptive on all modules.

 


Suggested Answer: A

 

 

Question 17

Which two components should be checked when a Cisco Nexus 9000 Series Switch fails to boot using POAP? (Choose two.)

A. POAP feature license

B. DHCP server to bootstrap IP information

C. image noted in the script file against switch bootflash

D. script signed with security key

E. TFTP server that contains the configuration script

 


Suggested Answer: BE

PowerOn Auto Provisioning (POAP) automates the process of upgrading software images and installing configuration files on devices that are being deployed in the network for the first time.
When a device with the POAP feature boots and does not find the startup configuration, the device enters POAP mode, locates a DHCP server, and bootstraps itself with its interface IP address, gateway, and DNS server IP addresses. The device also obtains the IP address of a TFTP server and downloads a configuration script that enables the switch to download and install the appropriate software image and configuration file.
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/fundamentals/configuration/guide/b_Cisco_Nexus_9000_Series_NX-

OS_Fundamentals_Configuration_Guide_7x/b_Cisco_Nexus_9000_Series_NX-OS_Fundamentals_Configuration_Guide_7x_chapter_0100.html

 

Question 18

Which two actions must be taken to directly connect a Fibre Channel storage array to a Cisco UCS domain? (Choose two.)

A. Configure a Fibre Channel port channel.

B. Configure the Fibre Channel port as a Fibre Channel storage port.

C. Create a new vHBA dedicated to the storage array.

D. Create a Storage Connection Policy.

E. Configure a new VSAN.

 


Suggested Answer: BE

 

 

Question 19

Image
Refer to the exhibit. A source is sending a multicast traffic stream to the receiver. How is the multicast traffic expected to flow through the network when it reaches a vPC peer?

A. • The multicast traffic is not replicated to the ports that joined a multicast group (224.0.0.13) or the peer link.• The multicast traffic stream flows over the vPC link to ensure that orphan ports get the multicast stream in failure scenarios.

B. • The multicast traffic is replicated to the ports that joined a given multicast group and the peer link.• The multicast traffic stream flows from Agg-1 to Agg-2 over the M1-to-M2 peer link and forwards the traffic over Layer 4 to Access-2.

C. • The multicast traffic is replicated to the ports that joined a given multicast group and the peer link.• The multicast traffic stream flows over the peer link to ensure that orphan ports receive the multicast stream in failure scenarios.

D. • The multicast traffic is not replicated to the ports that joined a multicast group (224.0.0.13) or the peer link.• The multicast traffic stream flows from Agg-1 to Agg-2 over the M1-to-M2 peer link and forwards the traffic over Layer 4 to Access-2.

 


Suggested Answer: D

 

 

Question 20

DRAG DROP -
 Image
Refer to the exhibit. Drag and drop each traffic flow type from the left onto the corresponding number on the right. Not all traffic flow types are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 21

An engineer must automate the provisioning of Cisco ACI objects using the Terraform tool. The engineer must ensure that APIC counts the authentication login requests against the threshold to avoid a DOS attack. Which configuration must be used in Terraform to accomplish these goals?

A. resources with user ID and password

B. resources with signature-based authentication

C. provider with user ID and password

D. provider with signature-based authentication

 


Suggested Answer: C

 

 

Question 22

A network engineer configures a converged network adapter (CNA) and must associate a virtual Fibre Channel 7 interface to VSAN 7. The CNA is connected to the interface Eth1/7, and VLAN 700 is mapped to the VSAN. Which configuration must be applied to create the virtual Fibre Channel interface and associate it with the Ethernet physical interface?

A. switch(config)# interface vfc 7 switch(config-if)# bind interface ethernet 1/7

B. switch(config)# vlan 700 switch(config-vlan)# fcoe vsan 7

C. switch(config)# vsan database switch(config-vsan)# vsan 7 interface vfc 7

D. switch(config)# interface ethernet 1/7 switch(config-if)# vfc 7 attach vlan 1,700

 


Suggested Answer: A

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/fcoe/421_n1_1/b_Cisco_n5k_fcoe_config_gd_re_421_n1_1/

Cisco_n5k_fcoe_config_gd_re_421_n1_1_chapter4.html

 

Question 23

Image
Refer to the exhibit. SVR-A in EPG-A/BD-A fails to reach SVR-B in EPG-B/BD-B. Which two conditions should be verified to analyze the traffic between the two EPGs? (Choose two.)

A. A contract exists between EPG-A and EPG-B and allows the traffic.

B. The bridge domain for EPG-B floods ARP packets.

C. EPG-A and EPG-B are excluded from the preferred group.

D. Limit Endpoint Learning is disabled on the bridge domain for EPG-B.

E. SVR-B is learned as an endpoint in EPG-B from Node-112.

 


Suggested Answer: AE

 

 

Question 24

Image
Refer to the exhibit. The MDS-EDGE-Switch and MDS-Core-Switch are configured with NPV and NPIV features. The FLOGI from Cisco UCS is received by the
MDS-Core-Switch on interface fc1/2. An engineer tried to move all traffic between the MDS-EDGE-Switch and MDS-Core-Switch from interface fc1/2 to fc1/3, but the attempt failed. Which set of actions completes the configuration?

A. Shut down fc1/1 in the MDS-EDGE-Switch. Re-apply the command. Enable interface fc1/1.

B. Disable the NPIV feature in the MDS-EDGE-Switch. Re-enable the NPIV feature. Disable interface fc1/3.

C. Disable the NPV feature in the MDS-EDGE-Switch. Re-enable the NPV feature. Disable interface fc1/1.

D. Shutdown fc1/3 in the MDS-EDGE-Switch. Re-apply the command. Enable interface fc1/3.

 


Suggested Answer: A

 

 

Question 25

An engineer implements an environment with multiple traffic types on a consolidated I/O link between Cisco Nexus 9000 Series Switch and MDS 9000 Series Switch. The configuration must meet these requirements:
• The unified I/O link must support LAN and SAN traffic.
• A single, multipurpose Ethernet transport must be used.
• The configuration must discard MAC addresses that are not part of the current fabric.
• The QoS markings must be preserved.
Which configuration set meets the requirements?

A. MDS-A(config)# interface fcip4 -MDS-A(config-if)# use-profile 8 -MDS-A(config-if)# peer-info ipaddr 200.200.100.7

B. N9K-2(config)# interface Eth2 -N9K-2(config-if)# switchport mode trunkN9K-2(config-if)# auto qos trust dscp

C. MDS-B(config)# interface fc3 -MDS-B(config-if)# switchport trunk mode onMDS-B(config-if)# switchport trunk allowed vsan 2-5

D. N9K-1(config)# fcoe fcmap 0e.fc.1dN9K-1(config)# int vfc 1 -N9K-1(config-if)# bind interface e1/3

 


Suggested Answer: A

 

 

Question 26

An engineer must implement a Cisco UCS system at a customer site. One of the requirements is to implement SAN boot. The storage system maps the source
WWPN to a unique LUN.
Which method does Cisco recommend to configure the SAN boot?

A. Define the vHBAs as bootable and leave the boot target definition empty.

B. Create a SAN boot policy in which every initiator is mapped to a different target LUN.

C. Define the vHBAs as bootable and leave the default values on the boot target definition.

D. Create a SAN boot policy in which every initiator is mapped to the same target LUN.

 


Suggested Answer: D

Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/CLI-User-Guides/Server-Mgmt/3-1/
b_Cisco_UCS_Manager_Server_Mgmt_CLI_Guide/server_boot.html#concept_8AD0577BC71F495B88BAF4335C4EF348

 

Question 27

What is required for using Ansible with HTTP/HTTPS protocol in a Cisco NX-OS environment?

A. XML management interface

B. SSH

C. Open Agent Container

D. NX-API

 


Suggested Answer: D

Reference:
https://docs.ansible.com/ansible/latest/network/user_guide/platform_nxos.html

 

Question 28

A new employee must be granted access to add VLANs into an existing Cisco UCS Manager and configure NTP synchronization with date and time zone settings.
Which two privileges must be granted to the employee to complete the task? (Choose two.)

A. Service Profile Compute (ls-compute)

B. Ext LAN Policy (ext-lan-policy)

C. Service Profile Network Policy (ls-network-policy)

D. Service Profile Config (ls-config)

E. Ext LAN Config (ext-lan-security)

 


Suggested Answer: DE

Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/Reference-Docs/Privileges/4-0/UCSM-Privileges-4_0/UCSM-Privileges-

4_0_chapter_01.html

 

Question 29

A storage array must be connected to port ethernet1/10 on a Cisco MDS 9000 Series Switch. In addition, the array must connect using the FCoE protocol and be single-homed. Which configuration meets these requirements?

A. vsan database vlan 101 vsan 101 fcoe vsan 101 interface vfc 10 interface 1/10 switchport mode e fcoe vfc 10

B. interface vfc 10 switchport mode f bind interface ethernet 1/10 vsan database vsan 101 vlan 101 fcoe vsan 101 vsan 101 interface vfc 10

C. vlan database vlan 101 vsan vsan 101 fcoe vsan 101 interface vfc 10 interface ethernet1/10 switchport mode trunk bind interface vfc 10 fcoe vsan 101

D. vlan database vlan 101 fcoe vsan 101 enable interface vfc 10 vsan 101 interface vfc 10 switchport mode fcoe switchport access vlan 101 bind interface ethernet1/10

 


Suggested Answer: B

We must use mode f, because in a switch, on a port which connects to a node, we configure an F port (fabric port). On the endhost (array/storage) side, this port is an N (node) port.

 

Question 30

A new user with access privileges in the Finance department moves to a new Admin department. The user must have access privileges to the Admin department data and applications inside the Cisco UCS Manager. Which set of changes must be implemented in Cisco UCS Central for the user to acquire the privileges?

A. Disable the Finance user account and add the authentication service for the Admin privileges.

B. Create a new locale Admin and add the Admin department to the Admin locale.

C. Create an Admin user account and remove the authentication service for the Finance privileges.

D. Delete the old locale Finance and remove the Finance department from the Finance locale.

 


Suggested Answer: C

 

 

Question 31

Image
Refer to the exhibit. An engineer must distribute all the host ports to use all eight configured FEX uplinks. The solution must minimize disruption if an uplink fails.
Which action accomplishes this objective?

A. Set the pinning max-links value to 8

B. Configure the eight uplinks in a port channel

C. Change the supported FEX type

D. Statically assign each host interface to a fabric uplink

 


Suggested Answer: B

A fabric interface that fails in the port channel does not trigger a change to the host interfaces. Traffic is automatically redistributed across the remaining links in the port channel fabric interface. If all links in the fabric port channel go down, all host interfaces on the FEX are set to the down state.
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus2000/sw/configuration/guide/
b_Cisco_Nexus_2000_Series_Fabric_Extender_Software_Configuration_Guide_Release_4_2/ b_Cisco_Nexus_2000_Series_Fabric_Extender_Software_Configuration_Guide_Release_4_2_chapter_011.html

 

Question 32

Image
Refer to the exhibit. A network engineer requires remote access via SSH to a Cisco MDS 9000 Series Switch. The solution must support secure access using the local user database when the RADIUS servers are unreachable from the switches. Which command meets these requirements?

A. aaa authentication none

B. aaa authentication login default group radius

C. aaa authentication login default fallback error local

D. aaa authentication login default group local

 


Suggested Answer: C

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/security/configuration/guide/b_Cisco_Nexus_9000_Series_NX-

OS_Security_Configuration_Guide/b_Cisco_Nexus_9000_Series_NX-OS_Security_Configuration_Guide_chapter_0111.html

 

Question 33

Image
Refer to the exhibit. Server1 is connected to a Cisco Nexus 9000 Series Switch via a 1-Gb port channel. The storm control is applied to the Eth0 device with a zero percent value. What does the switch do to traffic that traverses the switch interfaces during the streaming window that exceeds the bandwidth of the interfaces?

A. suppresses all traffic

B. forwards all traffic

C. drops all of the excess traffic

D. forwards half of the traffic

 


Suggested Answer: D

 

 

Question 34

What does this configuration create?
 Image

A. three subnets within a bridge domain

B. a CTX1 tenant

C. an L3OUT-1 bridge domain

D. two L3Out domains

 


Suggested Answer: B

 

 

Question 35

An engineer is converting a Cisco MDS switch to support NPIV mode.
What should be considered when implementing the solution?

A. It requires mapping of external interface traffic.

B. It must be enabled on VSAN 1 only.

C. It must be enabled globally on all VSANs.

D. It requires the FLOGI database to be disabled.

 


Suggested Answer: C

About N Port Identifier Virtualization
N port identifier virtualization (NPIV) provides a means to assign multiple FC IDs to a single N port. This feature allows multiple applications on the N port to use different identifiers and allows access control, zoning, and port security to be implemented at the application level. Figure 1-1 shows an ex-ample application using
NPIV.
Figure 1-1 NPIV Example –
Reference Image
You must globally enable NPIV for all VSANs on the MDS switch to allow the NPIV-enabled applica-tions to use multiple N port identifiers.
Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/int/nxos/cli_interfaces/npv.html

 

Question 36

A network automation engineer must configure a Cisco NX-OS REST API on a Cisco 9000 Series Switch with these requirements:
• NX-API REST and the DME database must be enabled.
• The NX-API REST must listen for HTTP traffic on port 83.
• The HTTPS certificate must be uploaded.
Which configuration set must be used to accomplish these goals?

A. feature nxapinxapi (tcp) port 83nxapi certificate {httpscrt}

B. feature nxapinxapi (tcp) port 83nxapi certificate {httpscrt}nxapi certificate enable

C. feature nxapinxapi (http) port 83nxapi certificate {httpscrt}

D. feature nxapinxapi {http} port 83nxapi certificate {httpscrt | httpskey}nxapi certificate enable

 


Suggested Answer: D

 

 

Question 37

Which Cisco UCS Manager XML encoded backup type must be used to back up user names, roles, and service profiles?

A. System Configuration

B. Full State Configuration

C. Logical Configuration

D. All Configuration

 


Suggested Answer: A

 

 

Question 38

An engineer configures a storage environment for a customer with high-security standards. The secure environment is configured in VSAN 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Choose two.)

A. fcsp enablefcsp auto-active

B. port-security enableport-security activate vsan 50

C. clear fabric-binding activate vsan 50fabric-binding activate vsan 50

D. fcsp dhchap hash md5 sha1

E. fabric-binding activate vsan 50 force

 


Suggested Answer: AC

 

 

Question 39

Refer to the exhibit.
 Image
Which setting must be configured to prevent the reuse of passwords?

A. Change Interval

B. No Change Interval

C. History Count

D. Change Count

 


Suggested Answer: C

Configuring the Password History Count
You must have admin or aaa privileges to change the password profile properties.
Reference Image
Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/GUI-User-Guides/Admin-Management/4-1/
b_Cisco_UCS_Admin_Mgmt_Guide_4-1/m_password_management.html

 

Question 40

What is an advantage of NAS compared to SAN?

A. It provides lossless throughput.

B. It offers enhanced NFS features.

C. It functions in an existing IP environment.

D. It offers enhanced security features.

 


Suggested Answer: C

 

 

Question 41

What is a benefit of Cisco HyperFlex All-Flash Stretched cluster deployment as compared to All-HDD Stretched cluster deployment?

A. lower number of IOPS

B. higher number of IOPS

C. lower cost

D. higher cost

 


Suggested Answer: B

 

 

Question 42

An engineer must perform an initial configuration of VXLAN Tunnel End-Point functionality on the Cisco Nexus 9000 Series platform. All the necessary features are already enabled on the switch. Which configuration set must be used to accomplish this goal?

A. NX9K(config)# interface loopback0 NX9K(config-if)# ip address 10.10.10.11/32 NX9K(config)# interface VLAN10 NX9K(config-if)# ip unnumbered loopback0 NX9K(config)# interface nve1 NX9K(contig-if-nve)# source-interface loopback0

B. NX9K(config)# interface loopback0 NX9K(config-if)# ip address 10.10.10.11/32 NX9K(config)# interface overlay0 NX9K(config-if-overlay)# source-interface loopback0 NX9K(config)# interface VLAN10 NX9K(contig-if-nve)# source-interface loopback0

C. NX9K(config)# interface loopback0 NX9K(config-if)# ip address 10.10.10.11/32 NX9K(config)# interface tunnel1 NX9K(config-if)# tunnel source loopback0 NX9K(config)# interface ethernet1/1 NX9K(contig-if)# ip unnumbered loopback0

D. NX9K(config)# interface loopback0 NX9K(config-if)# ip address 10.10.10.11/32 NX9K(config)# interface nve1 NX9K(config-if-nve)# source-interface loopback0 NX9K(config)# interface ethernet1/1 NX9K(contig-if)# ip unnumbered loopback0

 


Suggested Answer: D

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/vxlan/configuration/guide/b_Cisco_Nexus_9000_Series_NX-

OS_VXLAN_Configuration_Guide_7x/b_Cisco_Nexus_9000_Series_NX-OS_VXLAN_Configuration_Guide_7x_chapter_011.html

 

Question 43

What is the benefit of adding Cisco HyperFlex Hardware Acceleration Cards to a HyperFlex deployment?

A. increased compression efficiency

B. increased network throughput

C. GPU acceleration

D. offline encryption acceleration

 


Suggested Answer: A

HyperFlex Hardware Acceleration Cards provide improved performance and compression efficiency for most storage workloads.
Reference:
https://www.cisco.com/c/en/us/td/docs/hyperconverged_systems/HyperFlex_HX_DataPlatformSoftware/Installation_VMWare_ESXi/3_5/
b_HyperFlexSystems_Installation_Guide_for_VMware_ESXi_3_5/m_configure_hyperflex_hardware_acceleration_cards.html

 

Question 44

DRAG DROP -
An engineer must configure a control plane policy on a Cisco Nexus 9000 Series Switch that is located at IP 192.168.20.1 that meets these requirements:
✑ Only HTTP, RDP, and ICMP traffic is permitted from subnet 192.168.10.0/24.
✑ The committed information rate must be 54000 pps.
✑ The burst size must be 128 packets.
✑ Any other traffic must be dropped.
Drag and drop the code snippets from the bottom onto the blanks in the code on the top to complete the configuration. Not all code snippets are used.
Select and Place:
 Image

 


Suggested Answer:
Correct Answer Image

 

 

Question 45

An engineer must design an automation solution for the Cisco ACI Fabric to speed up the deployment of logical network elements for tenant provisioning. When creating a solution, the engineer must keep in mind that the tool must support these requirements:
* Allow the rapid creation and removal of logical containers.
* Support the creation of custom modules and data structures.
* Be extensible with external libraries and modules.
* Allow rapid testing of code using an on-demand execution environment.
Which automation tool meets these requirements?

A. SaltStack

B. YAML

C. Chef

D. Python

 


Suggested Answer: C

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus3600/sw/92x/programmability/guide/b-cisco-nexus-3600-nx-os-programmability-
guide-92x.pdf

 

Question 46

Image
Refer to the exhibit. An engineer needs to implement a monitoring session that should meet the following requirements:
✑ Monitor traffic from leaf to leaf switches on a Cisco ACI network
✑ Support filtering traffic from Bridge Domain or VRF
Which configuration must be added to meet these requirements?

A. interface eth 1/2 leaf 101

B. application epg epg1 app1

C. interface eth 1/2 switch 101

D. application app1 epg epg1

 


Suggested Answer: D

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/aci/apic/sw/1-x/troubleshooting/b_APIC_Troubleshooting/
b_APIC_Troubleshooting_chapter_0110.html

 

Question 47

An engineer must implement a solution that prevents untrusted DHCP servers from compromising the network. The feature must be configured on a Cisco Nexus
7000 Series Switch and applied to VLAN 10. The legitimate DHCP servers are connected to interface Ethernet 2/4. Which configuration set must be used to meet these requirements?

A. n7k-1(config)# ip dhcp snooping vlan 10 n7k-1(config)# interface Ethernet2/4 n7k-1(config-if)# ip dhcp snooping verify vlan 10

B. n7k-1(config)# ip dhcp snooping verify n7k-1(config)# interface Ethernet2/4 n7k-1(config-if)# ip dhcp snooping verify vlan 10

C. n7k-1(config)# ip dhcp snooping vlan 10 n7k-1(config)# interface Ethernet2/4 n7k-1(config-if)# ip dhcp snooping trust

D. n7k-1(config)# ip dhcp snooping verify n7k-1(config)# vlan configuration 10 n7k-1(config-vlan)# ip dhcp snooping trust

 


Suggested Answer: C

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/security/configuration/guide/b_Cisco_Nexus_9000_Series_NX-

OS_Security_Configuration_Guide_7x/b_Cisco_Nexus_9000_Series_NX-OS_Security_Configuration_Guide_7x_chapter_01100.html

 

Question 48

An engineer installed a new Nexus switch with the mgm0 interface in vrf management. Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS. Which command tests connectivity from the guest shell of the NX-OS?

A. [guestshell@guestshell ~]$ dohost ”ping vrf management 173.37.145.84”

B. [guestshell@guestshell ~]$ chvrf management ping 173.37.145.84

C. [guestshell@guestshell ~$ ping 173.37.145.84 vrf management

D. [guestshell@guestshell ~]$ iping vrf management ip 173.37.145.84

 


Suggested Answer: B

Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/7-x/programmability/guide/b_Cisco_Nexus_9000_Series_NX-

OS_Programmability_Guide_7x/Guest_Shell.html

 

Question 49

What is the impact of a nondisruptive upgrade on fabric and modular switches?

A. The upgrade disrupts the control plane for more than 120 seconds.

B. During the upgrade, new devices cannot log in to the fabric.

C. If a zone server merge is in progress, the upgrade continues without interruption.

D. When the installation is complete, the system BIOS must be updated.

 


Suggested Answer: B

 

 

Question 50

When the default firmware package is set to a new version, which type of policy determines the timing of server reboots during the firmware upgrade?

A. diagnostics

B. maintenance

C. local disk

D. BIOS

 


Suggested Answer: B

This activation procedure causes the server to reboot. Depending upon whether the service profile associated with the server includes a maintenance policy, the reboot can occur immediately. Cisco recommends that you upgrade the board controller firmware through the host firmware package in the service profile as the last step of upgrading a Cisco UCS domain, along with upgrading the server BIOS. This reduces the number of times a server needs to reboot during the upgrade process.
Reference:
https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/GUI-User-Guides/Firmware-Mgmt/3-1/
b_UCSM_GUI_Firmware_Management_Guide_3_1/b_UCSM_GUI_Firmware_Management_Guide_3_1_chapter_011.html

 

Access Full 350-601 Mock Test Free

Want a full-length mock test experience? Click here to unlock the complete 350-601 Mock Test Free set and get access to hundreds of additional practice questions covering all key topics.

We regularly update our question sets to stay aligned with the latest exam objectives—so check back often for fresh content!

Start practicing with our 350-601 mock test free today—and take a major step toward exam success!

Share18Tweet11
Previous Post

350-501 Mock Test Free

Next Post

350-701 Mock Test Free

Next Post

350-701 Mock Test Free

350-801 Mock Test Free

350-901 Mock Test Free

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Network+ Practice Test

Comptia Security+ Practice Test

A+ Certification Practice Test

Aws Cloud Practitioner Exam Questions

Aws Cloud Practitioner Practice Exam

Comptia A+ Practice Test

  • About
  • DMCA
  • Privacy & Policy
  • Contact

PracticeTestFree.com materials do not contain actual questions and answers from Cisco's Certification Exams. PracticeTestFree.com doesn't offer Real Microsoft Exam Questions. PracticeTestFree.com doesn't offer Real Amazon Exam Questions.

  • Login
  • Sign Up
No Result
View All Result
  • Quesions
    • Cisco
    • AWS
    • Microsoft
    • CompTIA
    • Google
    • ISACA
    • ECCouncil
    • F5
    • GIAC
    • ISC
    • Juniper
    • LPI
    • Oracle
    • Palo Alto Networks
    • PMI
    • RedHat
    • Salesforce
    • VMware
  • Courses
    • CCNA
    • ENCOR
    • VMware vSphere
  • Certificates

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.