Valentine Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

A new employee must be granted access to add VLANs into an existing Cisco UCS Manager and configure NTP synchronization with date and time zone settings. Which two privileges must be granted to the employee to complete the task? (Choose two.)

A.

Service Profile Compute (Is-compute)

B.

Ext LAN Config (ext-lan-security)

C.

Service Profile Network Policy (Is-network-policy)

D.

Service Profile Config (Is-config)

E.

Ext LAN Policy (ext-lan-policy)

Full Access
Question # 5

Refer to the exhibit.

A flapping link issue has been reported on the vPC keepalive link. A packet capture has been activated on the Cisco Nexus switch. What is the destination IP address of the vPC keepalive packets that are sent by the switch?

A.

192.168.254.4

B.

239.255.70.83

C.

192.168.254.1

D.

192.168.254.2

Full Access
Question # 6

An engineer must perform a backup operation of the Cisco UCS system. The backup must be transferred to a secure location using UDP and must contain information about VLANs, VSANs, and other policies. Also, the operations team requires the backup file to be in a human-readable format. Which configuration set meets these requirements?

A.

Type: System configuration

Protocol: SCP

B.

Type: Logical configuration

Protocol: TFTP

C.

Type: All configuration

Protocol: FTP

D.

Type: Full state

Protocol: SFTP

Full Access
Question # 7

A network engineer must perform a backup and restore of the Cisco Nexus 5000 Series Switch configuration. The backup must be made to an external backup server. The only protocol permitted between the Cisco Nexus switch and the backup server is UDP. The backup must be used when the current working configuration of the switch gets corrupted. Which set of steps must be taken to meet these requirements?

A.

1 Perform a startup-config backup to an FTP server.

2 Copy startup-config in the boot flash to the running-config file

B.

1 Perform a running-config backup to an SFTP server

2 Copy backup-config from the SFTP server to the running-config file

C.

1 Perform a running-config backup to an SCP server

2 Copy running-config in the boot flash to the running-config file

D.

1 Perform a startup-config backup to a TFTP server

2 Copy backup-config from the backup server to the running-config file

Full Access
Question # 8

Refer to the exhibit A network engineer must run a continuous capture on a port A script called ''capture'1 is created to start and stop the capture task Which command sequence makes the capture persistent after a reboot?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 9

An engineer needs to connect Cisco UCS Fabric Interconnect (FI) to an external storage array. Due to budget limitations, the engineer must connect a Cisco UCS FI directly to an FC storage port. Which two actions must be taken to complete this connection? (Choose two.)

A.

Configure the fabric interconnect in FC switch mode.

B.

Set FC zoning to disabled when creating the VSAN

C.

Create a storage connection policy.

D.

Configure the fabric interconnect in end-host mode,

E.

Create the required VSAN in the SAN cloud.

Full Access
Question # 10

An engineer is performing an ISSU upgrade on the Cisco MDS 9000 Series Switch. What is the impact on the control plane of the switch?

A.

It remains down until the next reboot.

B.

It remains up throughout the update.

C.

It remains down for more than 80 seconds but less than 140 seconds.

D.

It is down for less than 80 seconds.

Full Access
Question # 11

The Cisco Nexus switch Generic Online Diagnostics policy for a PortLoopback test requires 10 consecutive failures to error disable the port. The customer wants to change it to 5 consecutive failures. Which configuration applies the changes for module 1 only?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 12

Which statement about the impact of a rolling EPLD upgrade on a Cisco MDS 9000 Series Switch is true?

A.

All modules on the switch are disrupted.

B.

An EPLD upgrade is nondisruptive.

C.

Only the modules that are being upgraded are disrupted.

D.

The upgrade can be performed from the standby supervisor module.

Full Access
Question # 13

An engineer must create a scheduler configuration to create two backup jobs per day. The backup file must be copied to a server in the operations VRF. Which configuration accomplishes this task?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 14

What is an advantage of using Ansible for automation as compared to puppet and chef?

A.

Ansible automates the enforcement of configuration settings.

B.

Ansible perform automation without installing a software agent on the target node.

C.

Ansible configures a set of CLI commands on a device by using NETCONF.

D.

Ansible abstracts a scenario so that set of configuration setting can be used across multiple operating systems.

Full Access
Question # 15

An engineer is implementing OTV on a transport that supports multicast. The solution needs to meet the following requirements:

• Establish adjacency to the remote peer by using multicast.

• Enable OTV advertisements for VLAN 100 to the other site.

Which two commands should be configured to meet these requirements? (Choose two.)

A.

otv site-vlan 100

B.

otv data-group 232.2.2.0/28

C.

otv use-adjacency-server 172.27.255.94

D.

otv extend-vlan 100

E.

otv control-group 232.1.1.1

Full Access
Question # 16

An engineer is implementing security on the Cisco MDS 9000 switch. Drag drop the descriptions from the left onto the correct security features on the right.

Full Access
Question # 17

An engineer performs a Firmware Auto Install upgrade through the Cisco UCS Manager. Which two Cisco UCS components are upgraded in the Install Server Firmware stage? (Choose two)

A.

Cisco UCS C-Series Rack-Mount Server

B.

I/O Modules

C.

Cisco UCS Manager

D.

Cisco UCS B-Series Blade Server

E.

Fabric Interconnects

Full Access
Question # 18

Refer to the exhibit.

Which statement about the ERSPAN configuration in this environment is true.

A.

Host A is the source of ERSPAN spanned traffic and host B is the traffic analyzer.

B.

Host B is the source of ERSPAN spanned traffic and host A is the traffic analyzer.

C.

The session number of the source of ERSPAN spanned traffic must have a session ID of 48 for the traffic analyzer to receive the traffic.

D.

The session number of the source of ERSPAN spanned traffic must have a session ID of 47 for the traffic analyzer to receive the traffic.

Full Access
Question # 19

Refer to the exhibit.

In a bidirectional PIM network using Phantom RP as an RP redundancy mechanism, two Cisco NX-OS routers have these requirements:

• R1 must be the active RP.

• R2 must be the backup RP that is used only if R1 is not reachable

Drag and drop the configuration steps to complete the configuration for Router 2. Not all configuration steps are used.

Full Access
Question # 20

An engineer is running an ACI fabric, has VMM integration with VMware vCenter, and wants to enable microsegmentation based on vCenter VM attributes. Which statement about microsegmentation is true?

A.

ACI does not support microsegmentation based on vCenter VM attributes. You should use network attributes for mircosegmentation.

B.

An ACI microsegmented EPG automatically creates a port group with a private VLAN configured on a VMware vCenter distributed virtual switch.

C.

When enabled, microsegmentation performs distributed switching and routing on the ESXi hosts.

D.

Microsegmentation is supported only using AVE or AVS.

Full Access
Question # 21

An engineer must configure SAN connectivity in Cisco UCS manager. The requirement is to specify the WWPN of the storage array and set the zoning type to single initiator multiple targets. The engineer must also configure interrupt handling and queues of the vHBA interface. Which two Cisco UCS policies should be used to configure the settings? (Choose two.)

A.

storage connection policy

B.

SAN connectivity policy

C.

vHBA policy

D.

Fibre Channel adaptor policy

E.

boot policy

Full Access
Question # 22

An engineer is implementing FCoE. Which aspect of DCBXP on a Cisco Nexus switch affects this implementation?

A.

It uses the Cisco Fabric Services protocol to exchange parameters between two peer links.

B.

It always is enabled on 10/100-Mbps native Ethernet ports.

C.

It provides the authentication of peers on the Cisco Nexus switch.

D.

It requires that LLDP transmit and LLDP receive are enabled on the FCoE interface.

Full Access
Question # 23

A server engineer wants to control power usage on a Cisco UCS C-Series rack server down to the component level.

Which two components support specific power limits? (Choose two.)

A.

storage controller

B.

network controller

C.

processor

D.

graphic card

E.

memory

Full Access
Question # 24

Refer to the exhibit. Server1 is connected to a Cisco Nexus 9000 Series Switch via a 1-Gb port channel. The storm control is applied to the Eth0 device with a zero percent value. What does the switch do to traffic that traverses the switch interfaces during the streaming window that exceeds the bandwidth of the interfaces?

A.

forwards all traffic

B.

forwards half of the traffic

C.

suppresses all traffic

D.

drops all of the excess traffic

Full Access
Question # 25

What are two requirements when planning a Cisco HyperFlex All Flash standard cluster installation using three HX240c M5 servers? (Choose Two)

A.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames do not have to be enabled on the upstream switches.

B.

The hypervisors must be installed to Cisco FlexFlash SD cards.

C.

If the Jumbo MTU option in the HyperFlex installer is enabled, then jumbo frames must also be enabled on the upstream switches.

D.

The cluster deployment type must support a mix of HDD and SSD.

E.

The servers must be discovered, unassociated, and connected to each fabric interconnect.

Full Access
Question # 26

Due to a newly announced security advisory, a company has been Informed that they must update the configuration of 500 network devices that ate deployed n their network. The engineering team must assist the operations team to prepare for this update. The operations team does not have direct access to the network devices and must log in via a Linux server. This Is the first time that the team is making a network-wide configuration and must change all devices without first installing additional software on the network devices. The operations team is unfamiliar with automation and scripting technologies. Which automation tool must be used to accomplish this goal?

A.

Chef

B.

Ansible

C.

Puppet

D.

Saltstack

Full Access
Question # 27

An engineer must build a lab replica of a Cisco UCS production environment. The file must be imported into a new Cisco UCS cluster using a Cisco UCS manager GUI. The file must be in XML format and be exported from Cisco UCS Manager using encrypted method. Which two configuration parameters should be selected to meet these requirements?. (Choose two.)

A.

Type: Logical configuration

B.

Protocol SCP

C.

Type Full state

D.

Protocol TFTP

E.

Type All configuration

Full Access
Question # 28

Which component is disrupted when the cisco integrated Management controller is upgraded on a cisco UCS series server?

A.

Cisco UCS Manager

B.

SAN traffic

C.

KVM sessions

D.

Data traffic

Full Access
Question # 29

Refer to the exhibit. An engineer is troubleshooting intermittent connectivity issues between the client PC and the DHCP server. What does the last package captured from the Cisco Nexus 2000 Series Switch indicate?

A.

The DCHP server releases the IP address from the client.

B.

The client receives an IP address from the DHCP server.

C.

The DHCP server sends an IP address via a broadcast message.

D.

The client sends a unicast message to receive an IP address from the DCHP server.

Full Access
Question # 30

A customer asks an engineer to develop an orchestration solution to automate repetitive tasks. The customer operations team must integrate the tool with its existing automation framework. The customer asks for the tool to support these requirements:

•The customer's security requirements mandate the use of SSH transport.

•No extra software must be installed on the managed systems.

•The support staff has limited knowledge of scripting languages, so the solution must be easy to read and use declarative language.

Which solution meets these requirements?

A.

PowerShell

B.

Ansible

C.

Chef

D.

Puppet

Full Access
Question # 31

A network administrator must automate the process of pinging all the IP addresses from the 10.0.0.0/8 subnet. The subnet is already present in the ARP table of the Cisco Nexus switch. Drag and drop the bash commands to generate the desired output. Not all commands are used.

Full Access
Question # 32

An engineer is deploying a VXLAN EVPN environment for a customer. The customers environment suffers from a large amount of flooding related to hosts attempting to resolve the MAC to IP mapping on the network segment. Which feature prevents this issue from happening in the future?

A.

anycast rendezvous point

B.

anycast gateway

C.

IP ARP SYNC

D.

IP ARP suppression

Full Access
Question # 33

Refer to the exhibit.

What be connected to clear the HA NOT READY status?

A.

server chassis

B.

network uplinks

C.

management ports

D.

Layer 1-Layer 2 ports

Full Access
Question # 34

Drag and drop the storage technologies from the left onto the correct descriptions on the right.

Full Access
Question # 35

An engineer must implement a Cisco UCS system at a customer site. One of the requirements is to implement SAN boot. The storage system maps the source WWPN to a unique LUN. Which method does Cisco recommend to configure the SAN boot?

A.

Create a SAN boot policy in which every initiator is mapped to the same target LUN.

B.

Define the vHBAs as bootable and leave the default values on the target definition.

C.

Define the vHBAs as bootable and leave the boot target definition empty.

D.

Create a SAN boot policy in which every initiator is mapped to a different target LUN.

Full Access
Question # 36

A network engineer must deploy a configuration backup policy to the Cisco UCS Manager. The file generated from this backup must have a snapshot of the entire system that should be used to restore the system during disaster recovery. The backup file must be transferred insecurely by using the TCP protocol. Which configuration backup settings meet these requirements?

A.

Type: All Configuration

Protocol: SCP

B.

Type: Logical Configuration

Protocol: SFTP

C.

Type: Full State

Protocol: FTP

D.

Type: System Configuration

Protocol: TFTP

Full Access
Question # 37

Refer to the exhibit.

Which type of backup is required to restore a Cisco UCS configuration?

A.

system configuration

B.

all configuration

C.

logical configuration

D.

full state

Full Access
Question # 38

An engineer must perform a software upgrade on a production Cisco Nexus 7000 Series Switch. Before the upgrade activity, the requirement is for all ports to be shut down and routing protocols to terminate gracefully. Which feature must be used to meet these requirements?

A.

Configuration Profile

B.

Maintenance Mode Profile

C.

Switch Profile

D.

Service Profile Template

Full Access
Question # 39

An engineer needs to make an XML backup of Cisco UCS Manager The backup should be transferred using an authenticated and encrypted tunnel and it should contain all system and service profiles configuration Which command must be implemented to meet these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 40

Refer to the exhibit. An engineer needs to implement streaming telemetry on a cisco MDS 9000 series switch. The requirement is for the show command data to be collected every 30 seconds and sent to receivers. Which command must be added to the configuration meet this requirement?

A.

Sensor-grp 200 sample-period 30000

B.

Snsr-grp 200 sample-interval 30

C.

Sensor-grp 200 sample-period 30

D.

Snsr-grp 200 sample-interval 30000

Full Access
Question # 41

What are two capabilities of the Cisco Network Assurance Engine? (Choose two.)

A.

It verifies the speed of network packet flows by using telemetry.

B.

It predicts the network load on a data center.

C.

It validates that devices comply with network security policies.

D.

It ensures that network performance meets an SLA.

E.

It predicts the impact of changes to the network.

Full Access
Question # 42

An engineer must configure OSPFv2 connectivity between a pair of Cisco Nexus switches. The connection between the switches must meet these requirements:

  • Use unicast for updates.
  • Use decentralized communication of updates.
  • Full adjacency between switches.

Which configuration is needed to meet these requirements?

A.

interface with a type of p2p network

B.

stub area between the neighbors

C.

filter list between the neighbors

D.

virtual link between the neighbors

Full Access
Question # 43

What is a feature of NFS?

A.

role-based access control

B.

Kerberos-based security model

C.

block-based file access

D.

zone-based access control

Full Access
Question # 44

A company plans to migrate some of its services to the cloud. The company does not want to manage or control the underlying cloud infrastructure. It also wants to maintain control over the deployment of its applications and configuration settings of the application-hosting environment. Which cloud service model meets these requirements?

A.

Infrastructure as a Service

B.

Function as a Service

C.

Platform as a Service

D.

Software as a Service

Full Access
Question # 45

Refer to the exhibit. A developer must create a Bash script that performs a Chef Client reload in the event of a system reset. Which command completes the script?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 46

Which two statements about the process of upgrading an EPLD on a Cisco MDS 9000 series Switch are correct? (Choose two.)

A.

The EPLDs for all the modules on a switch must be upgraded at the same time.

B.

EPLD upgrades can be completed without powering down the module during the upgrade.

C.

EPLDs can be upgraded only to the latest EPLD image.

D.

EPLDs can be upgraded without replacing the hardware.

E.

An upgrade verification identifies the impact of each EPLD upgrade.

Full Access
Question # 47

An engineer configures port security on a Cisco MDS 9000 Series Switch. The MDS switch configuration must meet these requirements

  • The switch must inmate the VSAN 4 port security database despite any conflicts.
  • New devices must be statically added to the switch.
  • Configuration changes for VSAN 4 must be applied throughout the fabric with any lodes on the fabric released

Which configuration set meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 48

Refer to the exhibit. An engineer must monitor the Ethernet port and the corresponding VLAN traffic for the hyper4 device The SW3 device is a Cisco Nexus 7000 Series Switch Drag and drop the code snippets from the right into the boxes in the configuration to meet these requirements.

Full Access
Question # 49

Which action must be performed before renumbering a Cisco UCS chassis?

A.

Move the chassis to new ports on fibric interconnect.

B.

Re-acknowledge the chassis.

C.

Decommission the chassis.

D.

Run the shut and no shut command on the connected ports.

Full Access
Question # 50

Refer to the exhibit. An engineer must monitor ingress traffic from SW1 and SW2 port-channel interfaces from SW3. Which configuration must be implemented to accomplish this goal?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 51

A network engineer must determine the cooling requirements for a Cisco UCS C-Series Rack Server. The server with PCIe cards is configured with a fan configuration policy. Which configuration should be used for the fan policy of the server?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 52

An engineer must perform a nondisruptive software upgrade on a dual supervisor Cisco Nexus 7000 series switch. What is the cause of the upgrade being disruptive?

A.

The show install all impact command is not issued before the upgrade

B.

The kickstart image is installed by using the Install all kickstart image system image command

C.

Attempt to simultaneously upgrade more than three cards

D.

Change to the configuration settings or the network connections during the upgrade process

Full Access
Question # 53

Which two firmware packages are included in the Cisco UCS C-Series Rack-Mount UCS-Managed Server Software bundle? (Choose two.)

A.

system

B.

third-party

C.

PSU

D.

CIMC

E.

BIOS

Full Access
Question # 54

The Cisco Nexus 5600 Series Switch experiences occasional packet drops on interface ethernet 1/16. An engineer wants to implement a SPAN session to investigate the issue further. The network analyzer to which the packets must be directed is located on interface 1/3. The analyzer is limited on disk space available for traffic capture, so the Nexus switch should send only the relevant data. Which two command sets configure the SPAN session that meets these requirements? (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 55

An engineer must implement a disaster recovery policy for the Cisco UCS infrastructure. The solution must meet these criteria:

  • The Recovery Point Objective must be 48 hours.
  • The backup must use encrypted transmission.
  • The Recovery Time Objective must be 4 hours.

Which configuration set must be used in the scheduled backup to meet these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 56

An engineer configures the properties of a cisco UCS cisco integrated Management controller network adapter for a standalone cisco C-Series server. The Fallback Timeout in the vNIC was set to 600. When the failure occurs. The secondary must be used and then fallback when the primary interface becomes available again. Which action be taken to meet these requirements?

A.

Set default VLAN on the adapters.

B.

Increase Cos to 6.

C.

Disable VNTAG mode.

D.

Enable Uplink failover.

Full Access
Question # 57

Refer to the exhibit.

What is the result of this series of commands?

A.

It reboots the server immediately.

B.

It verifies the firmware update on the server.

C.

It activates the firmware on the next adapter boot.

D.

It updates the firmware on adapter 1/1/1 immediately.

Full Access
Question # 58

An engineer is implementing NetFlow on a Cisco Nexus 7000 Series Switch. Drag and drop the NetFlow commands from the left into the correct order they must be entered on the right.

Full Access
Question # 59

An engineer must allow communication between the APIC controller and an OpenStack OpFlex agent. The agent is running on a compute node directly plugged to a Cisco ACI leaf switch. The engineer must enable and extend Infra VLAN on the port facing the compute and extend the Infra VLAN to the host. Which action must be taken to meet these requirements?

A.

Enable the Infra VLAN on the Interface Profile policy

B.

Enable the Infra VLAN on the Attachable Access Entity Profile.

C.

Add the infra VLAN via the physical domain.

D.

Add the infra VLAN via the VMM domain.

Full Access
Question # 60

Refer to the exhibit. Which feature set must be used to configure on switch 2 to establish a VSAN trunk between switch 1 and switch 2?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 61

An engineer configures a storage environment for a customer with high- security standards. The secure environment is configured in vsan 50. The customer wants to maintain a configuration and active databases and prevent unauthorized switches from joining the fabric. Additionally, the switches must prevent rogue devices from connecting to their ports by automatically learning the WWPNs of the ports connected to them for the first time. Which two configuration sets must be used to meet these requirements? (Chose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 62

Which product includes prebuilt templates that can be used to customize fabric deployments?

A.

Cisco ACI

B.

Cisco UCS Manger

C.

Cisco data Center Network Manger

D.

Cisco Tetration

Full Access
Question # 63

A network engineer needs to upgrade the EPLDs of the fabric modules for a Cisco MDS director-class switch. In which order are components reloaded during the process?

A.

one fabric module at the time

B.

all fabric modules followed by the entire switching platform

C.

all fabric modules in parallel

D.

one module and one supervisor at the time

Full Access
Question # 64

Refer to the exhibit.

Service degradation is reported on a VM that is deployed on a Cisco UCS blade server. The traffic from the vNIC is required to SPAN in both directions to a packet analyzer that is connected to UCS-A slot 2 port 12. Which two commands are needed to complete the configuration? (Choose two.)

A.

UCS-A /org/service-profile/vnic/mon-src* # set direction both

B.

UCS-A /eth-traffic-mon/fabric/eth-mon-session' # create dest-interface 2 12

C.

UCS-A /org/service-profile/vnic/mon-src* # set direction receive transmit

D.

UCS-A /eth-traffic-mon/fabric/eth-mon-session # activate

E.

UCS-A /eth-traffic-mon/fabric/eth-mon-session* # create eth-mon-session/dest-interface 2 12

Full Access
Question # 65

An engineer needs to Implement a solution that prevents loops from occurring accidentally by connecting a switch to interface Ethemet1/1. The port Is designated to be used tor host connectivity. What configuration should be implemented?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 66

A customer has a requirement for an automation solution that supports periodically acquiring configuration from a centralized server and aligning UCS servers to their desired state. Which open-source tool meets these requirements?

A.

SaltStack

B.

Terraform

C.

Puppet

D.

Kubemetes

Full Access
Question # 67

Which two methods are available to Manage an ACI REST API session authentication when a user is unauthenticated?

A.

POST to aaaLogin

B.

POST to aaaUserLogin

C.

GET aaaRefresh

D.

GET to aaaListDomains

E.

DELETE to aaaLogout

Full Access
Question # 68

AN engineer enters these commands while in EEM on a Cisco Nexus 9000 Series Switch.

event manager applet Backup-config

event timer watchdog time 1800 name timer

event cli match “copy running-config startup-config”

what is the result of applying this configuration?

A.

It saves the running configuration every 1800 seconds.

B.

It generates an error because no action is mentioned.

C.

It executes the copy running-config startup-config command.

D.

It blocks the copy running-config startup-config command.

Full Access
Question # 69

An engineer must configure a named VSAN when the fabric interconnect is in Fibre Channel switch mode The VSAN must meet these requirements:

  • Named VSAN must be called "VSAN 10".
  • VSAN ID must be 10.
  • FCoE ID must be 20.
  • VSAN 10 must be attached to port 2 in slot 1.

Which command set configures a VSAN when the fabric interconnect is in Fibre Channel switch mode?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

Refer to the exhibit. An engineer must configure FCoE between the N9K-A switch and the FCF-A Nexus 9000 core switch. The deployment has these characteristics:

  • The N9K-Aand N9K-B top-of-rack switches share the domain ID of the core switches.
  • The hosts are equipped with converged network adapters.
  • The only VSAN that is permitted to traverse port-channel 100 is VSAN 20.

Which configuration completes the FCoE configuration on the N9K-A device?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 71

Host 1 is in VLAN 100 located is DataCenter 1 and Host2 is in VLAN200 located in DataCenter2. Which OTV VLAN mapping configuration allows Layer 2 connectivity between these two hosts?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 72

A DNS server with IP address 192.168.1.1 is deployed in a data center A network engineer must configure a Cisco UCS Fabric Interconnect to use this DNS. Which configuration should be applied?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 73

What is a benefit of independent resource scaling in Cisco HyperFlex hybrid architecture?

A.

flexible expansion of compute, caching, and capacity

B.

remote booting of converged servers

C.

multivendor converged node hardware support

D.

support for compute nodes with third-party storage

Full Access
Question # 74

Refer to the exhibit An engineer must mirror the traffic on a switch The engineer locates the server port that requires monitoring on switch1, but the packet sniffer is on switch2 The engineer must configure the source IP address on switch1 Much command accomplishes this goal?

A.

monitor session 10 type erspan-source

B.

monitor erspon origin ip-address 209.165.200.225

C.

source ip 209.165.200.225

D.

source interface vbn512

Full Access
Question # 75

An engineer is automating a Cisco Nexus 9000 Series Switch using the NX-OS API. Which code snippet creates a local user called "tacuser" with an expiration date of 22 November?

A)

B)

C)

A.

Option A

B.

Option B

C.

Option C

Full Access
Question # 76

Which two actions are needed to configure a single Cisco APIC controller for Cisco ACI fabric for the first time? (Choose two.)

A.

Register the APIC that is connected to the switch.

B.

Configure the first Cisco APIC controller

C.

Configure the leaf switch where the Cisco APIC is connected, using CLI to allow APIC connectivity

D.

Register the switches that are discovered through LLDP.

E.

Register all leaf and spine switches

Full Access
Question # 77

A network engineer must create a script to quickly verify IP reachability for multiple hosts using ping from the Cisco NX-OS switches. The script should use the management VRF and exit the shell after execution Which script should be used to achieve this objective?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 78

An engineer troubleshoots an Fibre Channel deployment on a Cisco MDS 9000 Series Switch. What does this output indicate about port channel 1?

A.

Port channel 1 is configured to be an ISL.

B.

Port channel 1 is configured to connect to a host bus adapter.

C.

Port channel 1 is configured to connect to an NPIV switch.

D.

Port channel 1 is configured to connect to an NPV switch.

Full Access
Question # 79

A SAN administrator must Implement Infrastructure monitoring for the Fibre Channel storage environment. The storage environment consists of a standalone Cisco Nexus 9000 Series Switch and Cisco MDS 9000 Series Switches. The goal is to be able to visualize the SAN support VXLAN overlays and identify storage slow drain issues. Which monitoring solution accomplishes this task?

A.

Cisco Prime Infrastructure

B.

Cisco DCNM

C.

Cisco APIC

D.

Cisco Intersight

Full Access
Question # 80

A network engineer must enable port security on all cisco MDS series switches in the fabric. The requirement is to avoid the extensive manual configuration of the switch ports. Which action must be taken to meet these requirements?

A.

Activate CFS distribution and the auto-learning port security feature.

B.

Activate CFS distribution and file auto-learning port security feature on a per-VSAN basis.

C.

Enable the auto-learning port security feature on a per-VSAN basis.

D.

Enable the auto-learning port security feature.

Full Access
Question # 81

An engineer creates a service profile in Cisco UCS Manager and must assign a policy that reboots blades when changes are applied. The changes must be applied only after user acknowledgment. Which two policies must be configured to meet these requirements? (Choose two.)

A.

Boot Policy

B.

Global Policy

C.

Power Control Policy

D.

Maintenance Policy

E.

Reboot Policy

Full Access
Question # 82

An engineer implements a Cisco UCS C-Series Server that must adhere to these security requirements:

  • Unencrypted communication must be disabled.
  • The session timeout must not exceed 15 minutes.
  • Unencrypted traffic must be automatically diverted.
  • CLI-based management must use nondefault ports.

Which configuration set meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 83

Refer to the exhibit. Which backup operation type not include the preserve identities feature?

A.

Full state

B.

Logical configuration

C.

System configuration

D.

All configuration

Full Access
Question # 84

Refer to the exhibit. An engineer logs all occurrences of a configuration being saved. The engineer must generate an additional log message when someone attempts to change the configuration for interface Ethernet 1/1. Which set of commands must be used to meet these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 85

Which server policy is used to install new Cisco IMC software on a server?

A.

host firmware policy

B.

hypervisor firmware policy

C.

BIOS software policy

D.

Cisco IMC software policy

Full Access
Question # 86

Drag and drop the keywords onto the URL request to collect all the subnets configured under tenant Production using a REST API. Not all options are used.

Full Access
Question # 87

An engineer is configuring HTTPS access to Cisco UCS Manager The engineer created a keyring and created the certificate request for the keyring Cisco UCS Manager continues to receive untrusted messages from a Firefox browser and a Chrome browser Which action must be taken as the next step in the HTTPS access configuration?

A.

Create a trusted point

B.

Sign the certificate using the Cisco UCS Manager.

C.

Obtain a validated certificate from Cisco

D.

Install a trusted certificate in the browser store

Full Access
Question # 88

What is a benefit of using the Cisco UCS Lightweight upgrade feature?

A.

Security updates are scheduled with the next reboot of the fabric interconnects.

B.

All servers are rebooted to push the latest updates.

C.

The firmware version of a component is updated only when it has been modified.

D.

A soft reboot is available for the fabric interconnects.

Full Access
Question # 89

An engineer configures an intersignt virtual application and must claim over 200 targets. The engineer starts the Claim target procedure. The engineer has prepared this initial comma- separated value file to provision the targets:

Which Information must be included In the comma-separated value flit to provision the targets?

A.

FQON, AD name, IP address, email

B.

location, address, name. password

C.

certificate, user name, password. email

D.

target type, hostname or P address, user name, password

Full Access
Question # 90

After a Cisco Nexus 7000 Series Switch chassis replacement, the administrator discovers that all vPC-enabled LACP port channels are reinitialized. The administrator wants to prevent this issue the next time the chassis is replaced. Which two actions must be taken to meet this requirement before the isolated device is reloaded'? (Choose two)

A.

Set the vPC MAC address to a tower value than the peer

B.

Change the vPC system-priority of the replacement chassis to a higher value than the peer if.

C.

Change the vPC system-priority of the replacement chassis to a lower value than the peer.

D.

Set the vPC MAC address to a higher value than the peer

E.

Configure auto-recovery to the disable state on both peers

Full Access
Question # 91

A Cisco ACI engineer must configure an access port on a Cisco ACI leaf switch. The access policy should be configured so that it supports L30ut connectivity concurrently with several EPGs that are mapped to this interface with the static port method. How should the access policy be configured?

A.

by linking the interface policy group to multiple Attachable Access Entity Profiles

B.

with a single Attachable Access Entity Profile that is linked to the corresponding routed domain and physical domain

C.

with two interface policy groups that are linked to the same interface profile port selector

D.

by mapping a single physical domain, mapped to the L3out and EPG interfaces

Full Access
Question # 92

The FCoE technology is used in a data center and the MDS switches are configured as Fibre Channel Forwarders. What configuration should be applied to an MDS switch in order to be used as the best switch to connect by the CNAs in the fabric?

A.

fcoe fcf-priority 1024

B.

fcoe fcf-priority 512

C.

fcoe fcf-priority 0

D.

no fcoe fcf-priority

Full Access
Question # 93

Refer to the exhibit. Which information must be added to the script to complete the POAP operation on the Cisco Nexus 9000 Series Switch?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 94

An engineer must configure HTTPS secure management for Cisco UCS Manager using a key ring named kr2016 and a key size of 1024 bits. The environment consists of a primary fabric interconnect named UCS-A and a secondary fabric interconnect named UCS-B. Which command sequence must be used to accomplish this goal?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 95

Which behavior defines streaming telemetry as a push model in Cisco devices?

A.

Monitoring clients are pulling data from the network to see real-time statistics

B.

JSON encoded telemetry data is transported using the gRPC protocol

C.

The network devices send data in JSON or GPB format to configured endpoints

D.

Events and network changes generate telemetry data

Full Access
Question # 96

Drag and drop the Hyperflex characteristics from the left onto the appropriate Hyper Hex node types on the right.

Full Access
Question # 97

Which statement about the MAC address that the FCoE Initialization Protocol chooses for use by an E-Node in an FCoE implementation is true?

A.

The FCoE Initialization Protocol uses the burned-in MAC address of the converged network adapter for all FCoE operations.

B.

The FCoE Initialization protocol uses a 24-bit FC-MAP and concatenates a 24-bit Fibre Channel ID to create a fibric-provided MAC address.

C.

The FCoE Initialization Protocol uses 01.00.0C as the first 24 bits of the MAC address and appends a 24-bit Fibre Channel ID to derive a full 48-bit FCoE MAC address.

D.

FCoE does not use a MAC address. The FCoE Initialization Protocol is used to acquire a Fibre Channel ID, and the address is used for all FCoE communications in the same way as Fibre Channel Protocol.

Full Access
Question # 98

Refer to the exhibit.

What is a characteristic presented in the service profile of the UUID?

A.

based on the hardware

B.

vendor assigned

C.

unique system generated

D.

allocated from a UUID pool

Full Access
Question # 99

An engineer needs to monitor ingress traffic that arrives at interface Ethernet 1/3 that belongs to a Cisco Nexus 5600 Series Switch. The traffic analyzer machine located at interface Ethernet 1/5 is already monitoring other production, and the traffic analyzer must not be impacted by the traffic captured from the interface Eth1/3. The operations team allocated a traffic budget for the new monitoring session of 1 Gbps to meet this requirement Which set of commands configures the SPAN session?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 100

An engineer must recover the Cisco UCS system The full backup is available on a backup SCP server Which set of actions recovers the configuration of the Cisco UCS Manager?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 101

Refer to the exhibit. An engineer must implement VXIAN with anycast gateway. To accomplish this, an engineer must set up PIM Source-Specific Multicast for host reachability. Which IP address must be applied to interface loopback1 to accomplish this goal?

A.

255.0.0.1/8

B.

255.0.100

C.

10.10.0.1/32

D.

10.10.0.2/32

Full Access
Question # 102

What is the benefit of adding Cisco HyperFlex Hardware Acceleration Cards to a HyperFlex deployment?

A.

offline encryption acceleration

B.

increased network throughput

C.

GPU acceleration

D.

Increased compression efficiency

Full Access
Question # 103

An engineer must configure remote authentication on a Cisco UCS system. The user password must be encrypted before it is sent to the authentication server. The company security policy requires the server to be based on an open standard. Drag and drop the UCS CLI AAA configuration commands from the left into the order in which they must be implemented on the right. Not all commands are used.

Full Access
Question # 104

A server engineer wants to control power uses on a Cisco UCS C-series rack server down to the component level. Which two components support specific power limits? (Choose two.)

A.

memory

B.

graphic card

C.

processor

D.

network controller

E.

storage controller

Full Access
Question # 105

Which two configuration settings are available in the Cisco UCS Firmware Auto Sync Server policy? (Choose two.)

A.

Immediate Action

B.

User Acknowledge

C.

No Action

D.

Delayed Action

E.

User Notification

Full Access
Question # 106

A storage array must be connected to port ethernet1/10 on a Cisco MDS 9000 Series Switch In addition, the array must connect using the FCoE protocol and be single-homed Which configuration meets these requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 107

An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)

A.

Enable Encryption for LDAP

B.

Add a self-signed LDAP certificate to Cisco Intersight.

C.

Enable Certificate Signing Request in Cisco Intersight.

D.

Add a trusted root LDAP certificate to Cisco Intersight

E.

Add a trusted OAuth token to Cisco Intersight

Full Access
Question # 108

A company must security harden its Cisco UCS C-Series servers. The security policy requires all out-of-band management to meet these requirements

  • It must encrypt all traffic
  • It must use nondefault ports
  • It must provide private administrative sessions

Which Cisco IMC corrflguraton meets the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 109

An engineer evaluates a UI-based infrastructure management system capable of monitoring and deploying standardize VXLAN BGP EVPN deployments. The storage administrator else need the solution to manage the cisco MDS 9090 series Switches. Which solution meets these requirements?

A.

Intersight

B.

UCSD

C.

Tetration

D.

DCNM

Full Access
Question # 110

Which two statements about the process of performing an EPLD upgrade on a Cisco MDS 9000 series Switch are true? (Choose two.)

A.

If an upgrade is interrupted, the upgrade continues after a connection is restored.

B.

The upgrade can be performed from the standby supervisor module.

C.

The active supervisor can be upgraded.

D.

Modules must be online to be upgraded.

E.

The Upgrade process disrupts only the module that is being upgraded.

Full Access
Question # 111

An administrator is implementing DCNM so that events are triggered when monitored traffic exceeds the configured present utili zation threshold. The requirement is to configuration a maximum limit of 39860437 bytes that applies directly to the statistics collected as a ratio of the total link capacity. Which DCNM performance monitoring configuration parameter must be implemented to achieve this result?

A.

Absolution Values

B.

Baseline

C.

Utill%

D.

Per port Monitoring

Full Access
Question # 112

Which configuration statically assigns VSAN membership to a virtual Fibre Channel interface?

A.

switch(config-vsan-cb># vsan 100 bind interface fc 3/1

B.

switch

C.

switch(config-vsan-db># vsan 100 fc 3/1

D.

switch(config-vsan-db)# vsan 100 interface vfc 31

Full Access
Question # 113

An engineer must integrate Cisco ACI with a VMware vSphere environment. The requirement is to use a VMware Distributed Virtual Switch and to assign the encapsulation VLAN of the EPG from the VLAN pool. Which configuration set accomplishes this goa?

A.

Create a VMM domain association under the EPGs Create a VLAN pool with static alocated VLANs.

B.

Create a physical domain association under the EPGs Create a VLAN pool with static alocated VLANs.

C.

Create a physical domain association under the EPGs. Create a VLAN pool with oVnarmc alocated VLANs

D.

Create a VMM domain association under the EPGs Create a VLAN pool with dynamic alocated VLANs.

Full Access
Question # 114

A storage engineer must configure zoning on a Cisco MDS 9000 Series switch. Drag and drop actions from the left into the order on right

Full Access
Question # 115

An engineer is converting a Cisco MDS switch to support NPIV mode. What should be considered when implementing the solution?

A.

It must be enabled on VSAN 1 only.

B.

It must be enabled globally on all VSANs.

C.

It requires mapping of external interface traffic.

D.

It requires the FLOGI database to be disabled.

Full Access
Question # 116

A storage administrator notices an increasing number of storage targets that unexpectedly reach capacity, causing periodic service interruptions The administrator must now create and submit a daily report of the environment that shows the status of the storage targets with the highest capacities Which solution provides this information?

A.

Nagios Core with OpManager

B.

Cisco DCNM with SAN Insight

C.

SolarWinds with Slow Drain Analysis

D.

Cisco Intersight with Slow Drain Analysis

Full Access
Question # 117

An engineer installed a new Nexus switch with the mgm0interface in vrf management. Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS. Which command tests connectivity from the shell of the NX-OS?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 118

An engineer is implementing traffic monitoring for a server vNIC that is configured with fabric failover enabled. The requirement is for the traffic to be sent to an analyzer, even during a failure of one of the fabric interconnects. The analyzer is connected to unconfigured Ethernet ports on both fabric interconnects. Which configuration accomplishes this task?

A.

Create two traffic monitoring session with different names, one per fabric Connect the analyzer connected to FI-BI the destination for both monitoring sessions.

B.

Create two traffic monitoring session with different names, one per fabric.

C.

Connect an analyser on each FI as the destination for the monitoring session local to the FI.

D.

Create two traffic monitoring sessions with the same name, one per fabric Connect the analyze connected to FI-A as the destination for both monitoring sessions

E.

Option A

F.

Option B

G.

Option C

Full Access
Question # 119

A customer data center experiences bandwidth contention that affects the servers connected to the NPV enabled switch The NPV switch is connected to the NPIV switch using two 10 Gb uplinks but the traffic originating front the connected hosts to the core switch exceeds the available bandwidth The engineers decided to add a third uplink to the NPV server to increase the available bandwidth Which set of commands must be used to provision the new uplink?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 120

An engineer implements an ACI fabric and must implement microsegmentation of endpoints within the same IP subnet using a network-based attribute. The attribute mapping must allow IP subnet independence. Which attribute must be selected?

A.

MAC address

B.

Custom

C.

Tag

D.

IP

Full Access
Question # 121

An engineer is configuring VNTag between a virtualized server and a Cisco Nexus 5500 Series switch. Drag and drop the configuration steps from the into the correct order on the right.

Full Access
Question # 122

A network administrator must create a Linux container on a Cisco Nexus Series Switch. The container requires 10 percent of the CPU of the switch and 1024 MB of RAM to run successfully. Which task provides the necessary resources?

A.

Edit the container properties with the guestshell run command.

B.

Increase the compute resources with the guestshell resize command.

C.

Enable the Bash shell of the switch with the feature bash command

D.

Modify resource allocation with the virtual-service resize command.

Full Access
Question # 123

A network engineer must configure a power redundancy policy on a Cisco UCS C-Series Rack Server. The power redundancy must support two power sources being used to power the server. Which configuration should be applied to meet the requirement?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 124

Refer to the exhibit. An engineer must invoke a Python script that alerts the operations team when the router DC-RTR-1 becomes unreachable. Which configuration set accomplishes this task?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 125

A customer undergoes an IT security review assessment. The auditor must have read-only access to the Cisco Nexus 9000 Series Switch to perform the configuration review. The customer implements this security role for the auditor:

role name audit

rule 1 permit command *

rule 2 - Output omitted -

username auditor password C4SAFF0B96EB0045$c0 role audit

Which configuration snippet must complete the configuration?

A.

deny command write*

B.

permit command enable

C.

permit command show *

D.

deny command configure terminal

Full Access
Question # 126

Refer to the exhibit.

An engineer configures a new application profile using REST API and receives this error massage. Which method can be used before application profile can be configured?

A.

POST to aaaLogin

B.

POST to aaaRefresh

C.

POST to aaaLogout

D.

GET to aaaListDomains

Full Access
Question # 127

An engineer must implement protection against ICMP DoS attacks on a Cisco Nexus 9000 Series Switch. The requirement is to rate-limit ICMP without denying all other ICMP traffic. The ICMP trafic currently passing through the Cisco Nexus 9000 device must not be affected. Which configuration accomplishes these goals?

A.

Configure SNMP traps to send the ICMP notification if the CPU utilization is more than 90%.

B.

Reconfigure the Layer 3 interfaces to be in the non-default VRF and ICMP broadcast storm control

C.

Create an access list to deny ICMP traffic and apply it to all interlaces in the inside direction.

D.

Apply a control plane service policy that matches all ICMP traffic to drop the traffic fiat exceeds the threshold.

Full Access
Question # 128

Refer to the exhibit. Software downgrade is required on a Cisco Nexus 7000 Series Switch. What is displayed when this command is executed?

A.

features and commands that are removed automatically from the configuration

B.

features that are enabled automatically after the downgrade

C.

compatibility of software in the system bootflash file

D.

impact of a software upgrade in ISSU and chassis reload

Full Access
Question # 129

Drag and drop the technologies from the left onto the description on the right.

Full Access
Question # 130

Which file service protocol allows the files to appear locally mapped to the client and provides view, store, and update capabilities on a remote Linux-based storage repository that also serves as a distributed file system standard for NAS?

A.

NFS

B.

FTP

C.

iSCSI

D.

IFS

Full Access
Question # 131

Refer to the exhibit.

Which action is taken to ensure that the relay agent forwards the DHCP BOOTREQUEST packet to a DHCP server?

A.

Configure the interface of the DHCP server as untrusted.

B.

Configure the IP address of the DHCP server.

C.

Enable the DHCP relay agent.

D.

Verify the DHCP snooping bindings.

Full Access