Cisco (350-601-DCCOR) Exam Questions And Answers page 21
An engineer is implementing FCoE.
Which aspect of DCBXP on a Cisco Nexus switch affects this implementation?
Which aspect of DCBXP on a Cisco Nexus switch affects this implementation?
It uses the Cisco Fabric Services protocol to exchange parameters between two peer links.
It provides the authentication of peers on the Cisco Nexus switch.
It always is enabled on 10/100-Mbps native Ethernet ports.
Network Virtualization
Storage Networking
Refer to the exhibit.
Which statement about the ERSPAN configuration in this environment is true?
Which statement about the ERSPAN configuration in this environment is true?
The session number of the source of ERSPAN spanned traffic must have a session ID of 47 for the traffic analyzer to receive the traffic.
Host B is the source of ERSPAN spanned traffic and host A is the traffic analyzer.
The session number of the source of ERSPAN spanned traffic must have a session ID of 48 for the traffic analyzer to receive the traffic.
Host A is the source of ERSPAN spanned traffic and host B is the traffic analyzer.
Network Virtualization
Security
Port security is statically configured on a Cisco Nexus 7700 Series switch and F3 line card. The switch is configured with an Advanced Services license. Which two actions delete secured MAC addresses from the interface? (Choose two.)
The address must be removed from the configuration.
Shutdown and then no shutdown must be run on the interface.
The device must be restarted manually.
The address must reach the age limit that is configured for the interface.
The interface must be converted to a routed port.
Network Virtualization
Security
A network administrator must automate the process of pinging all the IP addresses from the 10.0.0.0/8 subnet. The subnet is already present on the ARP table of the Cisco Nexus switch. Drag and drop the bash commands to generate the desired output. Not all commands are used.
Network Virtualization
Automation
An engineer installed a new Nexus switch with the mgm0 interface in vrf management. Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS. Which command tests connectivity from the guest shell of the NX-OS?
[guestshell@guestshell ~]$ dohost ''ping vrf management 173.37.145.84''
[guestshell@guestshell ~]$ chvrf management ping 173.37.145.84
[guestshell@guestshell ~$ ping 173.37.145.84 vrf management
[guestshell@guestshell ~]$ iping vrf management ip 173.37.145.84
Network Virtualization
Security
Drag and drop the keywords onto the URL request to collect all the subnets configured under tenant Production using a REST API. Not all options are used.
Network Virtualization
Security
An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)
Enable Certificate Signing Request in Cisco Intersight
Add a trusted root LDAP certificate to Cisco Intersight
Enable Encryption for LDAP
Add a self-signed LDAP certificate to Cisco Intersight
Add a trusted OAuth token to Cisco Intersight
Compute
Security
Refer to the exhibit. An engineer must schedule the firmware upgrade of the Red1 and Red2 leaf switches. The requirement is to keep the upgrade time to the minimum, avoid any service impact, and perform the parallel upgrade. Which set of scheduler attributes must be used to meet these requirements?
• Configure SchedulerPolicy1 for leaf switches Blue1 and Red1, and SchedulerPolicy2 for leaf switches Blue2 and Red2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 1.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 1.
• Configure SchedulerPolicy1 for leaf switches Blue1 and Red1, and SchedulerPolicy2 for leaf switches Blue2 and Red2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 2.
• Configure SchedulerPolicy1 for all four leaf switches Blue1, Blue2, Red1, and Red2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 1.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 1.
• Configure SchedulerPolicy1 for all four leaf switches Blue1, Blue2, Red1, and Red2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 2.
• Configure SchedulerPolicy1 and SchedulerPolicy2 with a one-time window trigger that has maximum concurrent nodes 2.
Network Virtualization
Orchestration and Management
What happens to the default host firmware policy after a Cisco UCS Manager upgrade?
It is assigned to all the service profiles that include a host firmware policy.
It is replaced by a new default policy without any firmware entries.
It is set to match the host firmware policy.
It is updated to contain the firmware entries of all the components.
Compute
Security
Where is the witness deployed in a two-node Cisco HyperFlex Edge deployment?
to the HyperFlex Edge two-node cluster
to Cisco Intersight
to a third-party cloud provider
to an additional server with network access to HyperFlex Edge
Storage Networking
Compute
Comments