On a Cisco UCS B-Series data center environment; how many default roles are there when utilizing RBAC for security restriction?

On a Cisco UCS B-Series data center environment; how many default roles are there when utilizing RBAC for security restriction?A . 1B . 5C . 10D . 15E . 20View AnswerAnswer: C

January 6, 2020 No Comments READ MORE +

When using the Cisco UCS Manager GUI to troubleshoot a suspected bad memory, which logs contain data that are related to the faulty DIMM?

When using the Cisco UCS Manager GUI to troubleshoot a suspected bad memory, which logs contain data that are related to the faulty DIMM?A . the System Event log and Faults log that are located under the Admin tabB . the Events log and Faults log that are located under...

January 5, 2020 No Comments READ MORE +

Which statement about Cisco UCS version compatibility is true?

Which statement about Cisco UCS version compatibility is true?A . All bundles (A, B, and C) must be the same version.B . The B and C bundles must be the same revision.C . The A bundle can be one revision higher than the B/C bundles.D . The B/C bundles can...

January 5, 2020 No Comments READ MORE +

In a Cisco UCS environment, what are the three power types in a power policy? (Choose three.)

In a Cisco UCS environment, what are the three power types in a power policy? (Choose three.)A . backupB . gridC . redundD . n-plus-1E . non-redundF . plus-1View AnswerAnswer: BDE

January 5, 2020 No Comments READ MORE +

Which CLI command identifies the service profile that is associated with a particular compute blade, VIF, vNIC type, link state, and pinned interface?

Which CLI command identifies the service profile that is associated with a particular compute blade, VIF, vNIC type, link state, and pinned interface?A . show service-profile path server 1/2B . show service-profile circuit server 1/2C . show server-blade circuit server 1/2D . show server-blade path server 1/2View AnswerAnswer: B

January 5, 2020 No Comments READ MORE +

During a password recovery of a Cisco UCS system in a cluster configuration, what happens to blade traffic?

During a password recovery of a Cisco UCS system in a cluster configuration, what happens to blade traffic?A . There is no interruption to traffic, as the fabrics go down one at a time.B . Traffic stops flowing until the process is complete.C . There is no interruption to traffic...

January 5, 2020 No Comments READ MORE +

When a service profile is disassociated from a server, what happens to the identity and connectivity information for the server?

When a service profile is disassociated from a server, what happens to the identity and connectivity information for the server?A . It is cleared and set to the default that was setup initially by the first configuration.B . It is maintained and can be reused.C . It is reset to...

January 5, 2020 No Comments READ MORE +

As you validate the RAID controller configuration, which of these configured items impacts read performance at the controller level?

A customer calls in a trouble ticket complaining of unacceptable read I/O latency on a Cisco UCS C210 M2 server with an LSI MegaRAID 9260-8i with an 8-disk RAID-10 virtual disk. As you validate the RAID controller configuration, which of these configured items impacts read performance at the controller level?A...

January 4, 2020 No Comments READ MORE +

Which three are valid tech support bundles to collect in the local management shell? (Choose three.)

Which three are valid tech support bundles to collect in the local management shell? (Choose three.)A . UCSMB . UCSM-MGMTC . Port-ChannelD . AdapterE . SANF . FEXView AnswerAnswer: ABF

January 4, 2020 No Comments READ MORE +

Hotspot Question I

Hotspot Question I View AnswerAnswer:

January 4, 2020 No Comments READ MORE +