Cisco (350-601-DCCOR) Exam Questions And Answers page 24
Refer to the exhibit.
The STP priority of N7K-1 and N7K-2 are the lowest in the network.
Which statement describes STP on the vPC?
The STP priority of N7K-1 and N7K-2 are the lowest in the network.
Which statement describes STP on the vPC?
N7K-1 appears as the STP root.
N7K-1 preempts N7K-2 as the STP root.
N7K-2 appears as the STP root.
Network Virtualization
Compute
An engineer must configure OSPFv2 connectivity between a pair of Cisco Nexus switches. The connection between the switches must meet these requirements:
• Use unicast for updates.
• Use decentralized communication of updates.
• Full adjacency between switches.
Which configuration is needed to meet these requirements?
• Use unicast for updates.
• Use decentralized communication of updates.
• Full adjacency between switches.
Which configuration is needed to meet these requirements?
filter list between the neighbors
stub area between the neighbors
virtual link between the neighbors
interface with a type of p2p network
Network Virtualization
Compute
What is a key feature of the NFS (Network File System)?
Single Choice
What is a feature of NFS?
zone-based access control
Kerberos-based security model
block-based file access
role-based access control
Storage Networking
Security
A POAP-enabled Cisco Nexus switch will not enter POAP mode.
Which two conditions should be verified? (Choose two.)
Which two conditions should be verified? (Choose two.)
No startup configuration is available.
The switch is in bootup process.
The license file is missing on the switch.
Bootflash must contain a special directory named POAP with poap.py file.
No Cisco NX-OS image is present on the bootflash.
Network Virtualization
Security
Refer to the exhibit. Which command is run from the Guest Shell to set the description on the first five interfaces of the Cisco Nexus switch?
[guestshell@guestshell ~]$ for x in {1..5}; dohost conf t ; interface eth1/$x ; description Server$x ;
[guestshell@guestshell ~]$ for x in {1..5}; do dohost conf t ; interface eth1/$x ; description Server$x ; done
[guestshell@guestshell ~]$ for x in (1..5); do dohost conf t ; interface eth1/$x ; description Server$x ; done
[guestshell@guestshell ~]$ for x in (1..5); dohost conf t ; interface eth1/$x ; description Server$x ;
Network Virtualization
Compute
Refer to the exhibit. An engineer must distribute all the host ports to use all eight configured FEX uplinks. The solution must minimize disruption if an uplink fails. Which action accomplishes this objective?
Set the pinning max-links value to 8
Configure the eight uplinks in a port channel
Change the supported FEX type
Statically assign each host interface to a fabric uplink
Storage Networking
Security
What configuration is set by running these commands?
Single Choice
Refer to the exhibit.
What is configured as a result of running these commands?
What is configured as a result of running these commands?
loose unicast RPF
strict unicast RPF
IP Source Guard
reverse lookup for outbound packets
Data Center Infrastructure
Compute
An engineer deploys a custom Guest Shell rootfs on a Nexus 9000 Series Switch. Drag and drop the steps from the left into the order required to deploy the solution on the right. Not all options are used.
Storage Networking
Compute
Refer to the exhibit. Drag and drop each traffic flow type from the left onto the corresponding number on the right. Not all traffic flow types are used.
Network Virtualization
Orchestration and Management
A Cisco MDS 9000 Series Switch is configured for SAN Analytics and SAN Telemetry Streaming. An engineer must enable analytics for NVMe on interfaces in the range of fc1/1-12. Due to a large amount of traffic generated in the SAN environment, the data must be collected at regular intervals of 60 seconds from ports fc1/1-12 and then for ports fc1/13-24 for the next 60 seconds. Ports in the range fc1/13-24 were already enabled for analytics. Which set of commands must be used to meet these requirements?
Storage Networking
Security
Comments