Cisco (350-601-DCCOR) Exam Questions And Answers page 22
Which solution provides remote and direct file-level access to users and systems?
Fibre Channel over Ethernet
network-attached storage
storage area network
Storage Networking
Automation
Refer to the exhibit.
Which two statements about the routing table of the leaf switch are true? (Choose two.)
Which two statements about the routing table of the leaf switch are true? (Choose two.)
10.20.1.0/24 is a BD subnet in ACI.
The next hop 10.0.1.14 for route 172.16.99.0/24 is the TEP address of a border leaf in ACI.
172.16.100.0/24 is a BD subnet in ACI.
The next hop 10.1.168.95 for route 172.16.100.0/24 is the TEP address of a border leaf in ACI.
The next hop 10.0.8.65 for route 10.20.1.0/24 is the TEP address of a border leaf in ACI.
Network Virtualization
Compute
Refer to the exhibit. Which type of backup is required to restore a Cisco UCS configuration?
system configuration
all configuration
full state
logical configuration
Compute
Automation
Refer to the exhibit. Which action is taken to ensure that the relay agent forwards the DHCP BOOTREQUEST packet to a DHCP server?
Enable the DHCP relay agent.
Configure the IP address of the DHCP server.
Verify the DHCP snooping bindings.
Configure the interface of the DHCP server as untrusted.
Network Virtualization
Automation
Refer to the exhibit. Which command needs to be added to the line starting with the file keyword to have the generated running-config file with the name fusion-config_ and current date?
str.( fusion-config_ ) + date
( fusion-config_ ) + date
( fusion-config_ + date )
string(( fusion-config_ ) + date
Automation
Security
When a strict CoPP policy is implemented, which statement describes an event during which packets are dropped?
A large system image is copied to a switch by using the default VRF.
Fifteen SSH sessions remain connected to the switch.
A ping sweep is performed on a network that is connected through a switch.
A web server that is connected to a switch is affected by a DDoS attack.
Network Virtualization
Security
Drag and drop the characteristics from the left onto the NAS protocols on the right. Some characteristics are used more than once.
Storage Networking
Security
Refer to the exhibit.
Which two statements about the routing table of the leaf switch are true? (Choose two.)
Which two statements about the routing table of the leaf switch are true? (Choose two.)
10.20.1.0/24 is a BD subnet in ACI.
The next hop 10.0.1.14 for route 172.16.99.0/24 is the TEP address of a border leaf in ACI.
172.16.100.0/24 is a BD subnet in ACI.
The next hop 10.1.168.95 for route 172.16.100.0/24 is the TEP address of a border leaf in ACI.
The next hop 10.0.8.65 for route 10.20.1.0/24 is the TEP address of a border leaf in ACI.
Network Virtualization
Compute
Refer to the exhibit. An engineer needs to implement streaming telemetry on a Cisco MDS 9000 Series Switch. The requirement is for the show command data to be collected every 30 seconds and sent to receivers. Which command must be added to the configuration to meet this requirement?
snsr-grp 200 sample-interval 30000
snsr-grp 200 sample-interval 30
sensor-grp 200 sample-period 30
sensor-grp 200 sample-period 30000
Storage Networking
Security
What are the two types of FC/FCoE oversubscription ratios?
Multiple Choice
What are two types of FC/FCoE oversubscription ratios? (Choose two.)
switch processing power to end-node processing power
port bandwidth to uplink bandwidth
server storage to end-node count
edge ISL bandwidth to core ISL bandwidth
host bandwidth to storage bandwidth
Storage Networking
Security
Comments