Which component of Cisco UCS B-Series is also referred to as a FEX?

Which component of Cisco UCS B-Series is also referred to as a FEX?A . UCS 5108B . UCS 2104XPC . UCS 6248UPD . UCS 6120E . UCS MK72-KRView AnswerAnswer: B

January 29, 2018 No Comments READ MORE +

Which routing protocol type prevents routing loops by recording each autonomous system that a route traverses?

Which routing protocol type prevents routing loops by recording each autonomous system that a route traverses?A . Path-vector routingB . Link-state routingC . Distance-vector routingD . Hybrid routingView AnswerAnswer: D

January 29, 2018 No Comments READ MORE +

Which action do you take?

You need to secure the default user account in a Cisco UCS domain. Which action do you take?A . Set an account password during the initial system setupB . Set the account to lock after a specified number offailed altemptsC . Delete the accountD . Rename the accountView AnswerAnswer: A

January 29, 2018 No Comments READ MORE +

Which two are benefits of Cisco Unified Fabric? (Choose two )

Which two are benefits of Cisco Unified Fabric? (Choose two )A . SNMPv3 strong authenticationB . reduced cablingC . zone port distributionD . consolidation of LAN and SAN over a common transportE . native AES-256 encryption of data in flightView AnswerAnswer: BD

January 29, 2018 No Comments READ MORE +

What is the cause?

A Primary Fault Tolerant VM is performing poorly despite its ESXi host having adequate resources and CPUs are idle. Other hosts in the cluster are much more heavily utilized. What is the cause?A . The Secondary VM is assigned to a different portgroup than the Primary.B . The Secondary VM...

January 29, 2018 No Comments READ MORE +

Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices?

Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices?A . Prime InfrastructureB . Prime AssuranceC . Prime Network RegistrarD . Prime Network Analysis ModuleView AnswerAnswer: A

January 29, 2018 No Comments READ MORE +

Which action accomplishes this task?

You want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage Encryption (NSE). Which action accomplishes this task?A . Perform a takeover-giveback of each node in the cluster to update the passphrase on each mode.B . Use the security key-manager setup command to change the...

January 29, 2018 No Comments READ MORE +

What should you do from the Management Portal?

You administer a virtual machine (VM) that is deployed to Azure. You configure a rule to generate an alert when the average availability of a web service on your VM drops below 95 percent for 15 minutes. The development team schedules a one-hour maintenance period. You have the following requirements:...

January 29, 2018 No Comments READ MORE +

Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?

Refer to the exhibit. Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?A . Link Combination Control ProtocolB . Port Aggregation ProtocolC . Port Combination ProtocolD . Link Aggregation Control ProtocolView AnswerAnswer: B Explanation: PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable- desirable,...

January 29, 2018 No Comments READ MORE +

Which of the following does the TOGAF document describe as the risk categorization prior to determining and implementing mitigating actions?

Which of the following does the TOGAF document describe as the risk categorization prior to determining and implementing mitigating actions?A . The critical level of riskB . The initial level of riskC . The intermediate level of riskD . The mitigated level of riskE . The residual level of riskView...

January 29, 2018 No Comments READ MORE +