Test Online Free Cisco 350-601 Exam Questions and Answers
Practice a live sample before buying full access. This page keeps the free 350-601 question set organized by page so visitors and search engines can reach the canonical -questions.html URL directly.
An engineer is deploying a VXLAN EVPN environment for a customer. The customers environment suffers from a large amount of flooding related to hosts attempting to resolve the MAC to IP mapping on the network segment.
Which feature prevents this issue from happening in the future?
Answer:
Question 167Selectable Answer
Refer to the exhibit.
Which type of backup is required to restore a Cisco UCS configuration?
DRAG DROP
Drag and drop the mechanisms to collect data from a network from the left onto their characteristics on the right
Answer:
Explanation:
Table
Description automatically generated with low confidence
Question 169Selectable Answer
An engineer installed a new Nexus switch with the mgm0interface in vrf management.
Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS.
Which command tests connectivity from the shell of the NX-OS?
Which command reduces the amount of time it takes to complete the ISSU on a Cisco Nexus 7000 series switch that has dual supervisor modules and two I/O modules?
DRAG DROP
An engineer is implementing NetFlow on a Cisco Nexus 7000 Series Switch.
Drag and drop the NetFlow commands from the left into the correct order they must be entered on the right.
Which data structure results from running this Python code?
Answer:
Question 173Selectable Answer
Refer to the exhibit.
An engineer must implement VXIAN with anycast gateway. To accomplish this, an engineer must set up PIM Source-Specific Multicast for host reachability.
Which IP address must be applied to interface loopback1 to accomplish this goal?
Answer:
Question 174Selectable Answer
An engineer wants to create a backup of Cisco UCS Manager for disaster recovery purposes.
What are two characteristics of a full state backup of a Cisco UCS Manager database? (Choose two.)
Answer: Explanation:
File: compressed file in .tar.gz format https://www.virtual-odyssey.com/2019/10/31/its-the-little-stuff-cisco-ucs-backups/the file extension for bin in a cisco context is usually the OS. tar files are used for backup.
https://peazip.github.io/tar-file-format.html
Question 175Selectable Answer
Refer to the exhibit.
What is the result of implementing this configuration?
Answer: Explanation:
tacacs-server key
To configure a global TACACS+ shared secret key, use the tacacs-server key command. To remove a configured shared secret, use the no form of this command.
tacacs-server key
[0 | 7] shared-secret Syntax Description 7 (Optional) Configures a preshared key specified in encrypted text to authenticate communication between the TACACS+ client and server.
Question 176Selectable Answer
A network engineer must configure a Cisco MDS switch to use the local user database for console access if all AAA servers are unreachable.
Which configuration should be applied to complete this task?
Answer:
Question 177Selectable Answer
An engineer must configure two Cisco Nexus 7000 series switches in the same data center to support OTV.
Which command set completes the join interface configuration?
Answer:
Question 178Selectable Answer
Refer to the exhibit.
An engineer must invoke a Python script that alerts the operations team when the router DC-RTR-1 becomes unreachable.
Which configuration set accomplishes this task?
Answer:
Question 179Written Answer
Copy the running configuration to the startup configuration
Answer: C Explanation:
Problems, such as memory corruption, can occur that make it necessary for you to recover your configuration from a backed-up version.
Each time that you enter a copy running-config startup-config command, a binary file is created and the ASCII file is updated. A valid binary configuration file reduces the overall boot time significantly. A binary file cannot be uploaded, but its contents can be used to overwrite the existing startup configuration. The write erase command clears the binary file.
SUMMARY STEPS