Which component of Cisco UCS B-Series is also referred to as a FEX?
Which component of Cisco UCS B-Series is also referred to as a FEX?A . UCS 5108B . UCS 2104XPC . UCS 6248UPD . UCS 6120E . UCS MK72-KRView AnswerAnswer: B
Which routing protocol type prevents routing loops by recording each autonomous system that a route traverses?
Which routing protocol type prevents routing loops by recording each autonomous system that a route traverses?A . Path-vector routingB . Link-state routingC . Distance-vector routingD . Hybrid routingView AnswerAnswer: D
Which action do you take?
You need to secure the default user account in a Cisco UCS domain. Which action do you take?A . Set an account password during the initial system setupB . Set the account to lock after a specified number offailed altemptsC . Delete the accountD . Rename the accountView AnswerAnswer: A
Which two are benefits of Cisco Unified Fabric? (Choose two )
Which two are benefits of Cisco Unified Fabric? (Choose two )A . SNMPv3 strong authenticationB . reduced cablingC . zone port distributionD . consolidation of LAN and SAN over a common transportE . native AES-256 encryption of data in flightView AnswerAnswer: BD
What is the cause?
A Primary Fault Tolerant VM is performing poorly despite its ESXi host having adequate resources and CPUs are idle. Other hosts in the cluster are much more heavily utilized. What is the cause?A . The Secondary VM is assigned to a different portgroup than the Primary.B . The Secondary VM...
Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices?
Which tool provides the necessary information to determine hardware lifecycle and compliance details for deployed network devices?A . Prime InfrastructureB . Prime AssuranceC . Prime Network RegistrarD . Prime Network Analysis ModuleView AnswerAnswer: A
Which action accomplishes this task?
You want to replace the key management passphrase of a FAS8200 system using onboard NetApp Storage Encryption (NSE). Which action accomplishes this task?A . Perform a takeover-giveback of each node in the cluster to update the passphrase on each mode.B . Use the security key-manager setup command to change the...
What should you do from the Management Portal?
You administer a virtual machine (VM) that is deployed to Azure. You configure a rule to generate an alert when the average availability of a web service on your VM drops below 95 percent for 15 minutes. The development team schedules a one-hour maintenance period. You have the following requirements:...
Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?
Refer to the exhibit. Which EtherChannel negotiation protocol is configured on the interface f0/13 f0/15?A . Link Combination Control ProtocolB . Port Aggregation ProtocolC . Port Combination ProtocolD . Link Aggregation Control ProtocolView AnswerAnswer: B Explanation: PAgP modes are off, auto, desirable, and on. Only the combinations auto-desirable, desirable- desirable,...
Which of the following does the TOGAF document describe as the risk categorization prior to determining and implementing mitigating actions?
Which of the following does the TOGAF document describe as the risk categorization prior to determining and implementing mitigating actions?A . The critical level of riskB . The initial level of riskC . The intermediate level of riskD . The mitigated level of riskE . The residual level of riskView...