Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

350-601 Cisco Implementing Cisco Data Center Core Technologies (350-601 DCCOR) Free Practice Exam Questions (2026 Updated)

Prepare effectively for your Cisco 350-601 Implementing Cisco Data Center Core Technologies (350-601 DCCOR) certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2026, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 3 / 6
Total 382 questions

An administrator in UCS Manager must enable its users to reboot and decommission the servers and perform backup jobs Which set of user privileges permits these activities?

A.

•Is-networfc •ext-lan-secunty

B.

•Is-storage •Is-config

C.

•Is-server-oper•Is-secunty

D.

•operations •pn-maintenance

Refer to the exhibit An engineer must provision a VXLAN deployment The OSPF has already been configured as the underlay protocol All BGP configurations will be performed using the template method The deployment must meet these requirements

    The local update source for leaf switches must be loopback 1

    The router ID must be the local loopback IP address

    The external BGP connections must use a template name

Drag and drop the configuration snippets from the bottom to complete the configuration

Which Cisco Nexus Dashboard feature analyzes flow telemetry data that is streamed from a Cisco Nexus 9000 Series Switch?

A.

Nexus Dashboard Data Broker

B.

Nexus Dashboard Fabric Controller

C.

Nexus Dashboard Insights

D.

Nexus Dashboard Orchestrator

Refer to the exhibit The VSAN 4041 and 4042 are exchanged between two Cisco MDS 9000 Series Switches called MDS-1 and MDS-2 The objective is to deploy a security mechanism on MDS-1 to allow MDS-2 to join the fabric exclusively Drag and drop the code snippets from the bottom onto the boxes in the code to complete the MDS-1 configuration Not all code snippets are used.

Which API standard is used to manage the UCS-X in Intersight Managed Mode?

A.

Blowfish

B.

XML

C.

WebRTC

D.

Redfish

A Cisco UCS C-Series server needs to be installed in a data center. The server must be managed by using Cisco UCS Manager with a single cable for management and data traffic. Which set of commands must be run on the server after a physical connection is established?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer is implementing traffic monitoring for a server vNIC that is configured with fabric failover enabled. The requirement is for the traffic to be sent to an analyzer, even during a failure of one of the fabric interconnects. The analyzer is connected to unconfigured Ethernet ports on both fabric interconnects. Which configuration accomplishes this task?

A.

Create two traffic monitoring sessions with different names, one per fabric.Connect an analyzer on each FI as the destination for the monitoring session local to the FI.

B.

Create two traffic monitoring sessions with the same name, one per fabric.Connect an analyzer on each FI as the destination for the monitoring session local to that FI.

C.

Create two traffic monitoring sessions with different names, one per fabric.Connect the analyzer connected to FI-B as the destination for both monitoring sessions.

D.

Create two traffic monitoring sessions with the same name, one per fabric.Connect the analyzer connected to FI-A as the destination for both monitoring sessions.

Which storage technology provides a simple, high-capacity solution and offers a direct file-access level to the shared storage?

A.

NFS

B.

iSCSI

C.

FCoE

D.

FCP

An engineer implements an ACI fabric and must implement microsegmentation of endpoints within the same IP subnet using a network-based attribute. The attribute mapping must allow IP subnet independence. Which attribute must be selected?

A.

MAC address

B.

Custom

C.

Tag

D.

IP

A DevOps engineer must use Python to manage a Cisco device. The device is in a highly secure DMZ environment. Only trusted Cisco Python libraries can be used. Which solution meets

the requirements?

A.

Develop an off-box Python script that uses trusted Cisco libraries.

B.

Develop an application by using serverless technologies in a primary cloud provider.

C.

Develop a containerization application that uses trusted Cisco-provided libraries.

D.

Develop an on-box Python script that uses trusted Cisco libraries.

Which Cisco Nexus Dashboard service distributes Cisco ACI network configuration policies and templates to different data centers?

A.

Nexus Orchestrator

B.

Nexus Insight

C.

Nexus Fabric Controller

D.

Nexus Data Broker

An engineer configures a storage environment for a customer with high- security standards. The secure environment is configured in vsan 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Chose two.)

A.

port-security enable port-security activate vsan 50

B.

clear fabric-binding activate vsan 50 fabric-binding activate vsan 50

C.

fabric-binding activate vsan 50 force

D.

fcsp enable fcsp auto-active

E.

fcsp dhchap hash md5 shal

Refer to the exhibit. Which command must be used to configure a VXLAN NVE tunnel interface such that MAC and IP address information are learned in the control plane?

A.

ingress-replication protocol bgp

B.

host-reachability protocol bgp

C.

host-reachability protocol static

D.

ingress-replication protocol static

Refer to the exhibit. An engineer must capture Fibre Channel traffic from the server and the supervisor to the Cisco MDS 9000 Series Switch fabric. The traffic must be forwarded to the analyzer Drag and drop the code snippets from the right onto the blanks in the code on the left to complete the configuration. Not all code snippets are used.

A customer asks an engineer to develop a framework that will be used to replace the process of the manual device configuration of Cisco NX-OS devices The engineer plans to use the programmatic

interface that meets these requirements:

    The development team is familiar with Windows-based scripting environment using PowerShell.

    The customer’s secunty requirements mandate the use of HTTPS transport.

Which solution must be used to meet these requirements?

A.

Open Agent Container

B.

VISORE

C.

NETCONF-YANG

D.

NX-API

Refer to the exhibit. An engineer configures FCoE in a newly installed data center Which configuration must be applied to activate VSAN 100 on VFC 100?

A.

Allow VSAN 100 on interface eth1/12.

B.

Map an FCoE VLAN to VSAN 100.

C.

Configure a VLAN on VFC 100.

D.

Issue the shutdown lan command on VFC 100

DNS server with IP address 192.168.1.1 is deployed in a data center A network engineer must configure a Cisco UCS Fabric Interconnect to use this DNS. Which configuration should be applied?

A.

ficl-mgmt-A# scope systemficl-mgmt-A /system # create dns 192.168.1.1ficl-mgmt-A /system* # commit-buffer

B.

ficl-mgmt-A# scope fabric-interconnect aficl-mgmt-A /fabric-interconnect # set name 192.168.1.1ficl-mgmt-A /fabric-interconnect # scope system

C.

ficl-mgmt-A /system # commit-bufferficl-mgmt-A# scope fabric-interconnect aficl-mgmt-A /fabric-interconnect # set name 192.168.1.1

D.

ficl-mgmt-A /fabric-interconnect* # commit-bufferficl-mgmt-A# scope systemficl-mgmt-A /system # scope servicesficl-mgmt-A /system/services # create dns 192.168.1.1ficl-mgmt-A /system/services* # commit-buffer

An engineer must configure a user role interface policy on a Cisco Nexus 9000 Series Switch. The role must prevent access to interface FC3/2 but allow access to interface FC3/1. Which

set of actions must be taken to accomplish this goal?

A.

Configure deny interface policy. Deny interface FC3/2. Permit interface FC3/1.

B.

Configure permit interface policy. Deny interface FC3/2. Deny interface FC3/1,

C.

Configure permit interface policy. Permit interface FC3/2. Permit interface FC3/1.

D.

Configure deny interface policy. Permit interface FC3/2. Deny interface FC3/1.

Refer to the exhibit. SVR-A in EPG-A/BD-A fails to reach SVR-B in EPG-B/BD-B. Which two conditions should be verified to analyze the traffic between the two EPGs? (Choose two.)

A.

A contract exists between EPG-A and EPG-B and allows the traffic.

B.

Limit Endpoint Learning is disabled on the bridge domain for EPG-B.

C.

SVR-B is learned as an endpoint in EPG-B from Node-112.

D.

EPG-A and EPG-B are excluded from the preferred group.

E.

The bridge domain for EPG-B floods ARP packets.

Refer to the exhibit. Server1 is connected to a Cisco Nexus 9000 Series Switch via a 1-Gb pod channel. The storm control is applied to the Eth0 device with a zero percent value What does the switch do to traffic that traverses the switch interfaces during the streaming window that exceeds the bandwidth of the interfaces?

A.

forwards half of the traffic

B.

suppresses all traffic

C.

forwards all traffic

D.

drops all of the excess traffic

Page: 3 / 6
Total 382 questions
Copyright © 2014-2026 Solution2Pass. All Rights Reserved