top of page

CCNP Data Center Dumps & Sample Questions for 300-635 Exam Success

  • CertiMaan
  • Oct 22
  • 10 min read

Updated: Nov 4

Boost your preparation for the Cisco CCNP Data Center certification with these reliable 300-635 exam dumps and sample questions. Specifically designed for the Automating Cisco Data Center Solutions (DCAUTO) exam, these resources cover core topics like data center automation, Cisco UCS Manager, NX-OS programmability, and REST APIs. These CCNP Data Center dumps reflect real exam scenarios to sharpen your skills and increase confidence. Whether you're looking for CCNP Data Center 300-635 practice tests, updated exam questions, or certification guides, this toolkit offers everything needed to ace your exam. Ideal for network engineers and professionals aiming to validate their Cisco data center automation expertise.



CCNP Data Center Dumps & Sample Questions List :


1. A set of automation scripts work with no issue from a local machine, but an experiment needs to take place with a new package found online. How is this new package isolated from the main code base?

  1. Add the new package to your requirements.txt file.

  2. Create a new virtual machine and perform a pip install of the new package.

  3. Perform a pip install of the new package when logged into your local machine as root.

  4. Create a new virtual environment and perform a pip install of the new package.

2. Which two benefits of using network configuration tools such as Ansible and Puppet to automate data center platforms are valid? (Choose two.)

  1. consistency of systems configuration

  2. automation of repetitive tasks

  3. ability to create device and interface groups

  4. ability to add VLANs and routes per device

3. Which two items are types of application isolation options available when Kubernetes is deployed with the ACI CNI plug-in? (Choose two.)

  1. VM Isolation

  2. Cluster Isolation

  3. Server Isolation

  4. Process Isolation

  5. Namespace Isolation

4. Which two items are types of application isolation options available when Kubernetes is deployed with the ACI CNI plug-in? (Choose two.)

  1. VM Isolation

  2. Cluster Isolation

  3. Server Isolation

  4. Process Isolation

  5. Namespace Isolation

5. How should the Kubernetes manifests be modified to allow Kubernetes environment integration with Cisco ACI?

  1. The metadata section must contain the Cisco APIC management IP.

  2. The manifest does not have to be changed, but the Kubernetes object is not discovered by Cisco ACI if this is not defined in the manifest.

  3. The manifests must include ACI EPG reference.

  4. No change is needed to perform this action.

6. How should the Kubernetes manifests be modified to allow Kubernetes environment integration with Cisco ACI?

  1. The metadata section must contain the Cisco APIC management IP.

  2. The manifest does not have to be changed, but the Kubernetes object is not discovered by Cisco ACI if this is not defined in the manifest.

  3. The manifests must include ACI EPG reference.

  4. No change is needed to perform this action.

7. Which Kubernetes container network interface provides intent-based networking from the same pane of glass that VMs and bare-metal servers are managed?

  1. ACI CNI plug-in

  2. Contiv CNI plug-in

  3. Ingress CNI plug-in

  4. Calico CNI plug-in

8. What is the default data encoding for the response output of the ACI APIC API inspector?

  1. CSV

  2. JSON

  3. XML

  4. YAML

9. What is a key characteristic of an ACI policy model?

  1. Logical and concrete domains are separated.

  2. All configuration is carried out against concrete entities.

  3. It allows communications with newly connected devices.

  4. Network administrators configure logical and physical system resources directly.

10. Which Kubernetes container network interface provides intent-based networking from the same pane of glass that VMs and bare-metal servers are managed?

  1. ACI CNI plug-in

  2. Contiv CNI plug-in

  3. Ingress CNI plug-in

  4. Calico CNI plug-in

11. When should the API Inspector be used?

  1. to send an API request to the APIC

  2. to learn or identify the sequence of API calls for a specific operation in the APIC GUI

  3. to verify the XML structure of an object based on a specific operation in the APIC GUI

  4. to launch an Ansible playbook

12. What is a key characteristic of an ACI policy model?

  1. Logical and concrete domains are separated.

  2. All configuration is carried out against concrete entities.

  3. It allows communications with newly connected devices.

  4. Network administrators configure logical and physical system resources directly.

13. During the process of starting a Python network telemetry collector, which command starts the Cisco bigmuddy-network-telemetry-collector from GitHub?

  1. model driven telemetry

  2. telemetry_receiver.py --ip-address --port

  3. telemetry_receiver.py --destination --url

  4. streaming telemetry

14. When should the API Inspector be used?

  1. to send an API request to the APIC

  2. to learn or identify the sequence of API calls for a specific operation in the APIC GUI

  3. to verify the XML structure of an object based on a specific operation in the APIC GUI

  4. to launch an Ansible playbook

15. When the Cisco bigmuddy-network-telemetry-collector from GitHub is used, which command displays only the message headers?

  1. --print

  2. --all

  3. --brief

  4. --print-all

16. Which action allows Docker daemon persistence during switchover on the Cisco Nexus 9500 Series Switches running Cisco NX-OS?

  1. Change the Docker configuration to include the live restore option.

  2. Copy the dockerpart file manually to the standby supervisor after performing the switchover.

  3. Copy the dockerpart file manually to the standby supervisor before performing the switchover.

  4. The system takes automatic action.

17. What are two differences between SNMP and model-driven telemetry? (Choose two.)

  1. SNMP uses a continuous stream model.

  2. SNMP uses a push model.

  3. SNMP uses a pull model.

  4. Model-driven telemetry uses a pull model.

  5. Model-driven telemetry uses a push model.

18. What is a feature of model- driven telemetry?

  1. randomizes the data out of the network

  2. continuously streams data out of the network

  3. randomizes the data coming to the network

  4. continuously pulls data out of the network

19. Which two capabilities apply to the DCNM API? (Choose two.)

  1. DCNM provides an XML-based SOAP API.

  2. DCNM requires a license to use the API.

  3. Some features of DCNM must be configured through the GUI.

  4. All API operations can be performed using the DCNM GUI.

  5. DCNM provides a REST-based API.

20. What are two capabilities of the DCNM REST API? (Choose two.)

  1. uses the dcnm-token header for requests authentication after initial basic authentication

  2. uses basic authentication without encoding for username and password

  3. supports HTTP until release 11.0(1)

  4. is separated into Classic LAN, LAN Fabric, Media Controller, and SAN Management categories

21. Which two components are required from the Cisco Intersight REST API Authentication? (Choose two.)

  1. SHA256 hash of the message body and message headers.

  2. SHA256 hash of the message body, including empty message bodies.

  3. RSA private key with a key size of 2048.

  4. RSA private key with a key size of 1024.

  5. SHA384 hash of the message body, excluding empty message bodies.

22. Which two capabilities apply to the DCNM API? (Choose two.)

  1. DCNM provides an XML-based SOAP API.

  2. DCNM requires a license to use the API.

  3. Some features of DCNM must be configured through the GUI.

  4. All API operations can be performed using the DCNM GUI.

  5. DCNM provides a REST-based API.

23. Which two statements describe the authentication method used with Cisco Intersight REST API Requests? (Choose two.)

  1. The REST API request contains a base64-encoded signature of the message content and headers.

  2. The REST API request message body is encoded as a SHA384 hash and then signed with the API Key ID.

  3. The Cisco Intersight Web service verifies the signature of incoming request with the RSA public key for the API Key ID.

  4. The incoming REST API request is challenged by the Cisco Intersight Web service with a request for the RSA private key.

24. Which programming language are the Cisco UCS Director custom workflow tasks written in?

  1. C++

  2. Python

  3. Java

  4. Cloupia Script

25. Which two statements apply to authentication when using the Cisco Intersight API? (Choose two.)

  1. Each API Key can be assigned specific roles but not privileges.

  2. Secret Key is only available at API Key creation time.

  3. An API Key is composed of a Key ID and Secret Key.

  4. The user credentials for the cisco.com accounts are shared with the Cisco Intersight Web Service.

26. A server profile with the string "WEST15" in its name must have the string "WEST15" changed to "LXT14". For example, server profile "VMHOST-WEST15-01" would need to be changed to "VMHOST-LXT14-01". Using the Cisco Intersight REST API in a Python script, which two GET API requests are used to retrieve just the server profile with the string "WEST15" in the name and the correct body for the API request to update the name? Assume the variable "sp_name" contains the name of the retrieved server profile. (Choose two.)

  1. GET https://intersight.com/api/v1/server/Profiles?$select=Name&$filter=contains(Name, 'WEST15')

  2. GET https://intersight.com/api/v1/server/Profiles?$select=Name&$filter=Name in('WEST15')

  3. BODY = { "Name": sp_name.format('WEST15', 'LXT14') }

  4. BODY = { "Name": sp_name.replace('WEST15','LXT14') }

27. During the process of starting a Python network telemetry collector, which command starts the Cisco bigmuddy-network-telemetry-collector from GitHub?

  1. model driven telemetry

  2. telemetry_receiver.py --ip-address --port

  3. telemetry_receiver.py --destination --url

  4. streaming telemetry

28. Which two statements about gRPC are true? (Choose two.)

  1. It is an IETF draft.

  2. It is an IETF standard.

  3. It runs over SSH.

  4. It runs over HTTPS.

29. What are two differences between SNMP and model-driven telemetry? (Choose two.)

  1. SNMP uses a continuous stream model.

  2. SNMP uses a push model.

  3. SNMP uses a pull model.

  4. Model-driven telemetry uses a push model.

30. What are two main guiding principles of REST? (Choose two.)

  1. cacheable

  2. trackable

  3. stateless

  4. single-layer system

31. Which two capabilities apply to the DCNM API? (Choose two.)

  1. DCNM provides an XML-based SOAP API.

  2. DCNM requires a license to use the API.

  3. Some features of DCNM must be configured through the GUI.

  4. DCNM provides a REST-based API.

32. Which two components are attributes of an ACI MIT managed object? (Choose two.)

  1. MO

  2. RN

  3. UNI

  4. DN

33. Which step must be taken to enable the REST API browser within Cisco UCS Director?

  1. Edit the user profile and enable developer options.

  2. Raise a case with TAC.

  3. The REST API browser is automatically enabled in Cisco UCS Director when a Power User is created.

  4. Log in as the user "REST".

34. How should the Kubernetes manifests be modified to allow Kubernetes environment integration with Cisco ACI?

  1. The metadata section must contain the Cisco APIC management IP.

  2. The manifest does not have to be changed, but the Kubernetes object is not discovered by Cisco ACI if this is not defined in the manifest.

  3. The manifests must include ACI EPG reference.

  4. No change is needed to perform this action. Answe

35. Which Ansible module is needed in to create a new VLAN 10 on the hosts defined in the "ucs" group?

  1. vlan

  2. ucs_vlans

  3. vlans

  4. nxos_vlans

36. When should the API Inspector be used?

  1. to send an API request to the APIC

  2. to learn or identify the sequence of API calls for a specific operation in the APIC GUI

  3. to verify the XML structure of an object based on a specific operation in the APIC GUI

  4. to launch an Ansible playbook

37. What are two main guiding principles of REST? (Choose two.)

  1. cacheable

  2. trackable

  3. stateless

  4. single-layer system

38. What are two differences between SNMP and model-driven telemetry? (Choose two.)

  1. SNMP uses a continuous stream model.

  2. SNMP uses a push model.

  3. SNMP uses a pull model.

  4. Model-driven telemetry uses a pull model.

  5. Model-driven telemetry uses a push model.

39. A set of automation scripts work with no issue from a local machine, but an experiment needs to take place with a new package found online.How is this new package isolated from the main code base?

  1. Add the new package to your requirements.txt file.

  2. Create a new virtual machine and perform a pip install of the new package.

  3. Perform a pip install of the new package when logged into your local machine as root.

  4. Create a new virtual environment and perform a pip install of the new package.

40. Which two capabilities apply to the DCNM API? (Choose two.)

  1. DCNM provides an XML-based SOAP API.

  2. DCNM requires a license to use the API.

  3. Some features of DCNM must be configured through the GUI.

  4. DCNM provides a REST-based API.

41. Which statement about synchronous and asynchronous API calls is true?

  1. Synchronous API calls wait to return until a response has been received.

  2. Synchronous communication is harder to follow and troubleshoot.

  3. Synchronous API calls must always use a proxy server.

  4. Asynchronous communication uses more overhead for client authentication.

42. Which step must be taken to enable the REST API browser within Cisco UCS Director?

  1. Edit the user profile and enable developer options.

  2. Raise a case with TAC.

  3. The REST API browser is automatically enabled in Cisco UCS Director when a Power User is created.

  4. Log in as the user "REST".

43. What are two main guiding principles of REST? (Choose two.)

  1. cacheable

  2. trackable

  3. stateless

  4. single-layer system

44. Which two statements apply to authentication when using the Cisco Intersight API? (Choose two.)

  1. Each API Key can be assigned specific roles but not privileges.

  2. Secret Key is only available at API Key creation time.

  3. An API Key is composed of a Key ID and Secret Key.

  4. The user credentials for the cisco.com accounts are shared with the Cisco Intersight Web Service.

45. Which action does the execution of this ACI Cobra Python code perform?

  1. It prints all LLDP neighbor MAC and IP addresses.

  2. It prints all Cisco Discovery Protocol neighbor MAC and IP addresses.

  3. It prints all endpoint MAC and IP addresses.

  4. It prints all APIC MAC and IP addresses.

46. Which two items are types of application isolation options available when Kubernetes is deployed with the ACI CNI plug-in? (Choose two.)

  1. VM Isolation

  2. Cluster Isolation

  3. Server Isolation

  4. Namespace Isolation

47. How is an ACI class name composed?

  1. :Method

  2. ClassName:Method

  3. Package:ClassName

  4. MitName:Method

48. What is the network bootstrap program used by Cisco NX-OS iPXE?

  1. NETBOOT

  2. NX-OS iPXE

  3. iPXE-POAP

  4. Mini-OS


FAQs


1. What is the CCNP Data Center 300-635 certification exam?

It is Cisco’s concentration exam focused on automating and programming Cisco Data Center solutions, including Cisco ACI, UCS, and NX-OS.

2. How do I become CCNP Data Center 300-635 certified?

To earn the CCNP Data Center certification, you must pass the 350-601 DCCOR (core exam) and one concentration exam such as 300-635 DCAUTO.

3. What are the prerequisites for the CCNP Data Center 300-635 exam?

There are no mandatory prerequisites, but Cisco recommends 3–5 years of experience with data center technologies.

4. How much does the CCNP Data Center 300-635 certification cost?

The exam fee is $300 USD.

5. How many questions are on the CCNP Data Center 300-635 exam?

The exam typically includes 55–65 multiple-choice questions.

6. What is the passing score for the CCNP Data Center 300-635 exam?

Cisco does not publish the exact score, but the passing range is generally around 825/1000.

7. How long is the CCNP Data Center 300-635 exam?

The exam duration is 90 minutes.

8. What topics are covered in the CCNP Data Center 300-635 exam?

It includes automation, programmability, REST APIs, Cisco ACI, UCS Director, NX-OS, and Python scripting.

9. How difficult is the CCNP Data Center 300-635 certification exam?

It is considered challenging, requiring both coding skills and in-depth knowledge of Cisco Data Center automation tools.

10. How long does it take to prepare for the CCNP Data Center 300-635 exam?

Most candidates prepare in 8–12 weeks, depending on their programming and networking experience.

11. Are there any CCNP Data Center 300-635 sample questions or practice tests available?

Yes, Cisco provides official exam guides, and CertiMaan offers dumps and practice tests.

12. What is the validity period of the CCNP Data Center 300-635 certification?

The certification is valid for 3 years.

13. Can I retake the CCNP Data Center 300-635 exam if I fail?

Yes, you can retake it after paying the exam fee again.

14. What jobs can I get with a CCNP Data Center 300-635 certification?

You can work as a Data Center Engineer, Network Automation Engineer, DevNet Specialist, or Infrastructure Architect.

15. How much salary can I earn with a CCNP Data Center 300-635 certification?

Certified professionals typically earn between $100,000–$140,000 annually, depending on role and experience.


Recent Posts

See All

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
CertiMaan Logo

​​

Terms Of Use     |      Privacy Policy     |      Refund Policy    

   

 Copyright © 2011 - 2025  Ira Solutions -   All Rights Reserved

Disclaimer:: 

The content provided on this website is for educational and informational purposes only. We do not claim any affiliation with official certification bodies, including but not limited to Pega, Microsoft, AWS, IBM, SAP , Oracle , PMI, or others.

All practice questions, study materials, and dumps are intended to help learners understand exam patterns and enhance their preparation. We do not guarantee certification results and discourage the misuse of these resources for unethical purposes.

PayU logo
Razorpay logo
bottom of page