Cisco (350-601-DCCOR) Exam Questions And Answers page 28
Refer to the exhibit. An engineer monitors ingress traffic from Host-A and all traffic for VLAN 20 from Host-B. Which configuration must be implemented to monitor and export traffic to Network Analyzer?
SW-1(config)# monitor session 5 type erspan-source
SW-1(config-erspan-src)# source interface ethernet 1/2 rx
SW-1(config-erspan-src)# source vlan 20 both
SW-1(config-erspan-src)# destination ip 10.10.10.1
SW-1(config-erspan-src)# erspan-id 111
SW-1(config-erspan-src)# no shut
SW-1(config-erspan-src)# source interface ethernet 1/2 rx
SW-1(config-erspan-src)# source vlan 20 both
SW-1(config-erspan-src)# destination ip 10.10.10.1
SW-1(config-erspan-src)# erspan-id 111
SW-1(config-erspan-src)# no shut
SW-1(config)# monitor session 5
SW-1(config-monitor)# source interface ethernet 1/2 rx
SW-1(config-monitor)# source interface ethernet 1/1 both
SW-1(config-monitor)# source vlan 20 both
SW-1(config-monitor)# destination interface ethernet 2/1
SW-1(config-monitor)# no shut
SW-1(config-monitor)# source interface ethernet 1/2 rx
SW-1(config-monitor)# source interface ethernet 1/1 both
SW-1(config-monitor)# source vlan 20 both
SW-1(config-monitor)# destination interface ethernet 2/1
SW-1(config-monitor)# no shut
SW-1(config)# monitor session 5 type erspan
SW-1(config-erspan-src)# source interface ethernet 1/2 rx
SW-1(config-erspan-src)# source interface ethernet 1/1 both
SW-1(config-erspan-src)# destination ip 10.10.10.1
SW-1(config-erspan-src)# mtu 1000
SW-1(config-erspan-src)# no shut
SW-1(config-erspan-src)# source interface ethernet 1/2 rx
SW-1(config-erspan-src)# source interface ethernet 1/1 both
SW-1(config-erspan-src)# destination ip 10.10.10.1
SW-1(config-erspan-src)# mtu 1000
SW-1(config-erspan-src)# no shut
Network Virtualization
Storage Networking
What occurs when running the command install deactivate while a software maintenance upgrade is performed on a Cisco Nexus 9000 Series switch?
The current set of packages is committed.
The package features for the line card are disabled.
The package is removed from the switch.
The current upgrade stops.
Network Virtualization
Security
Which two statements describe the process of upgrading an EPLD on a Cisco MDS 9000 Series Switch? (Choose two.)
EPLDs are only capable to be upgraded to the latest EPLD image.
EPLD upgrades are capable to be completed without powering down the module during the upgrade.
An upgrade verification identifies the impact of each EPLD upgrade.
The EPLDs for all the modules on a switch must be upgraded at the same time.
EPLDs are capable to be upgraded without replacing the hardware.
Storage Networking
Security
Refer to the exhibit.
What is the outcome of this command when the EPLD is updated on a Cisco Nexus 9000 Series Switch?
What is the outcome of this command when the EPLD is updated on a Cisco Nexus 9000 Series Switch?
displays the compatibility of the EPLD upgrade and the image in the bootflash
shows a simulated upgrade of the EPLD
upgrades the EPLD on the switch disruptively
displays the impact of the upgrade on the operation of the switch
Network Virtualization
Compute
An engineer is duplicating an existing Cisco UCS setup at a new site.
What are two characteristics of a logical configuration backup of a Cisco UCS Manager database? (Choose two.)
What are two characteristics of a logical configuration backup of a Cisco UCS Manager database? (Choose two.)
contains the configured organizations and locales
contains the VLAN and VSAN configurations
contains the AAA and RBAC configurations
contains all of the configurations
contains a file with an extension.tgz that stores all of the configurations
Network Virtualization
Compute
Refer to the exhibit. An engineer must monitor the Ethernet port and the corresponding VLAN traffic for the hyper4 device. The SW3 device is a Cisco Nexus 7000 Series Switch. Drag and drop the code snippets from the right into the boxes in the configuration to meet these requirements.
Network Virtualization
Storage Networking
A customer has a requirement to deploy a cloud service and needs to have full control over the underlying OS, data and applications.
Which cloud model meets this requirement?
Which cloud model meets this requirement?
MaaS
PaaS
SaaS
IaaS
Compute
Security
Which action must be performed before renumbering a Cisco UCS chassis?
Run the shut and no shut command on the connected ports.
Move the chassis to new ports on fabric interconnect.
Decommission the chassis.
Re-acknowledge the chassis.
Data Center Infrastructure
Compute
An engineer performs a set of configuration changes for the vPC domain using Session Manager. Which two commands are used to verify the configuration and apply the device changes when no errors are returned? (Choose two.)
commit
verify
apply
checkpoint
write
Network Virtualization
Security
Refer to the exhibit.
Which statement about the default gateway configuration of the vPC is true?
Which statement about the default gateway configuration of the vPC is true?
Either switch can act as the active default gateway.
N7K-1 acts as the default gateway for all traffic.
N7K-2 forwards traffic that is destined for the default gateway by using the peer link.
N7K-2 acts as the default gateway for all traffic.
Network Virtualization
Security
Comments