New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is an advantage of using OTV as compared to VPLS for data center redundancy?

A.

prevents loops on point-to-point links

B.

provides head-end replication

C.

uses a proactive MAC advertisement

D.

provides full-mesh connectivity

An engineer must design a multitenant solution using Cisco 7709 switches. The solution must support separate routing instances, separate spanning tree domains, and separate firewalls for each tenant. Which solution meets these requirements?

A.

CFS

B.

VDC

C.

vPC

D.

VRF

A network architect designs the iSCSI-based storage area network solution. The iSCSI datastore must be designed with high availability, minimal downtime, and no single point of failure. The requirement is to fail over I/O to alternate paths based on SCSI sense codes without reliance on network failures.

Which feature must be deployed to meet these requirements?

A.

hardware-based flow control

B.

port security

C.

iSCSI multipath

D.

NIC teaming

Refer to the exhibit A Cisco engineer is configuring Cisco Nexus 7000 Series Switches. To simplify initial configuration verification and vPC+/HSRP troubleshooting, the engineer configures the primary vPC+ peer device with the FHRP active router highest priority. The primary FHRP device responds to ARP requests, even though the secondary vPC+ device also forwards the data traffic. Which configuration enables the Layer 3 connectivity from each vPC* peer device?

A.

Configure a VLAN network interlace for the same VLAN from both devices.

B.

Ensure that the enhanced Layer 2 license has been installed.

C.

Manually configure virtual MAC addresses tor any FHRP protocol.

D.

Set a restore timer that delays the vPC+ restart.

Refer to the exhibit.

A high-availability setup for iSCSI is designed with the host running ISCSI software. Each storage port on the MDS exports the same two Fibre Channel target ports with different ISCSI target names. In this design, how many ISCSI session are created from the host so that recovery occurs if any component fails?

A.

2

B.

3

C.

4

D.

5

An engineer needs to configure multiple network devices using Ansible Device passwords must meet these requirements:

    be stored securely

    not be visible as plaintext

    be available to Ansible playbooks for executing scripts

Which solution must the engineer choose?

A.

Encrypt a password variable file using Ansible Vault.

B.

Store the passwords within a Git repository Secrets Manager

C.

Encrypt passwords as Ansible environment variables

D.

Encrypt the passwords within the Ansible inventory file.

An engineer is implementing a storage area network where an NPV is used. The engineer notices that the servers in a storage farm are experiencing heavy traffic contention. The engineer needs to migrate traffic from heavily loaded server interfaces to interfaces with less load. When the new links are deployed, the existing traffic is not rebalanced as expected. Which feature must be used to meet these requirements?

A.

NPIV

B.

multiple VSAN support

C.

DVM

D.

disruptive load balancing