Cisco (350-601-DCCOR) Exam Questions And Answers page 27
Refer to the exhibit. An engineer implements SPAN configuration on an Nexus 5000 series switch. Which two commands are necessary to complete the SPAN session configuration?
Configure the switchport monitor under interface fc2/2.
Configure session type fc under monitor session 1.
Configure the switchport mode SD under interface fc2/1.
Configure the switchport mode SD under interface fc2/2.
Network Virtualization
Orchestration and Management
Which component is disrupted when the Cisco Integrated Management Controller is upgraded on a Cisco UCS Series Server?
SAN traffic
Cisco UCS Manager
KVM sessions
data traffic
Compute
Automation
What is an advantage of NFSv4 over Fibre Channel Protocol?
uses IP transport
congestion management
improved security
lossless throughput
Network Virtualization
Storage Networking
A server engineer wants to control power usage on a Cisco UCS C-Series rack server down to the component level.
Which two components support specific power limits? (Choose two.)
Which two components support specific power limits? (Choose two.)
storage controller
network controller
processor
graphic card
memory
Compute
Security
A network engineer must implement RBAC on Cisco MDS 9000 Series Multilayer Switches.
Drag and drop the Cisco MDS 9000 Series roles from the left onto the categories they belong to on the right.
Drag and drop the Cisco MDS 9000 Series roles from the left onto the categories they belong to on the right.
Network Virtualization
Security
Drag and drop the firmware packages from the left onto the software bundles they belong to on the right.
Storage Networking
Security
The Cisco Nexus switch Generic Online Diagnostics policy for a PortLoopback test requires 10 consecutive failures to error disable the port. The customer wants to change it to 5 consecutive failures. Which configuration applies the changes for module 1 only?
Nexus(config)# event manager applet custom-PortLoopback override __PortLoopback
Nexus(config-applet)# event gold mod all test PortLoopback testing-type bootup consecutive-failure 5
Nexus(config-applet)# action 1 publish-event
Nexus(config-applet)# event gold mod all test PortLoopback testing-type bootup consecutive-failure 5
Nexus(config-applet)# action 1 publish-event
Nexus(config)# event manager applet custom-PortLoopback override __PortLoopback
Nexus(config-applet)# event gold mod 1 test PortLoopback testing-type monitoring consecutive-failure 5
Nexus(config-applet)# action 1 publish-default
Nexus(config-applet)# event gold mod 1 test PortLoopback testing-type monitoring consecutive-failure 5
Nexus(config-applet)# action 1 publish-default
Nexus(config)# event manager applet custom-PortLoopback override __PortLoopback
Nexus(config-applet)# event gold mod all test PortLoopback testing-type monitoring consecutive-failure 5
Nexus(config-applet)# action 1 policy-default
Nexus(config-applet)# event gold mod all test PortLoopback testing-type monitoring consecutive-failure 5
Nexus(config-applet)# action 1 policy-default
Nexus(config)# event manager applet custom-PortLoopback override __PortLoopback
Nexus(config-applet)# event gold mod 1 test PortLoopback testing-type bootup consecutive-failure 5
Nexus(config-applet)# action 1 policy-event
Nexus(config-applet)# event gold mod 1 test PortLoopback testing-type bootup consecutive-failure 5
Nexus(config-applet)# action 1 policy-event
Network Virtualization
Security
Drag and drop the characteristics from the left onto the correct storage systems on the right.
Storage Networking
Security
An engineer is implementing NetFlow on a Cisco Nexus 7000 Series Switch.
Drag and drop the NetFlow commands from the left into the correct order they must be entered on the right.
Drag and drop the NetFlow commands from the left into the correct order they must be entered on the right.
Network Virtualization
Compute
Multiple roles are applied to a user on the Cisco MDS 9000 Series Switch.
Which statement describes the result of this configuration?
Which statement describes the result of this configuration?
The last role assigned takes precedence over previous roles.
Access to a command takes priority over being denied access to a command.
Any commands that have conflicting settings between roles are denied.
The first role assigned takes precedence over subsequent roles.
Storage Networking
Security
Comments