Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An engineer is troubleshooting issues in Cisco UCS Director. Drag and drop the possible causes from the left onto the correct issues on the right.

Refer to an exhibit.

An engineer is troubleshooting an upgrade failure on a switch. Which action resolves the issue?

A.

Save the system image in NVRAM.

B.

Use the same system image as the kickstart image.

C.

Load a new system image.

D.

Reload the same system image.

Refer to the exhibit. A functioning trunk port Ethernet1/48 exists between two identical Cisco Nexus 5000 Series Switches. The interfaces on the switches support the MACsec feature and are configured identically. To enable manual MACsec, an engineer adds the configuration shown in the exhibit to both sides of the trunk. The trunk port stops functioning. Which action should be taken to resolve the issue?

A.

Disable and then enable the port

B.

Enable the license for the trunk ports to support MACsec

C.

Lower the MTU value to less than 9216 bytes

D.

Configure the PMK with a length of 2048 bytes

Refer to the exhibit.

An engineer fails to install Perl in the guest shell on a Cisco Nexus 9000 Series Switch. Which two actions must be taken in the guest shell to resolve the issue? (Choose two.)

A.

Add the DNS server and suffix.

B.

Add a default gateway and nameserver.

C.

Install the unbound resolver package using curl.

D.

Configure domain-name and nameserver under the management VRF.

E.

Export the http_proxy and https_proxy environment variables

The external routes fail to propagate to leaf switches in Cisco ACI fabric Which two actions resolve the issue? (Choose two.)

A.

Enable the VTEP pool in the fabric

B.

Assign an MP-BGP AS number to the fabric.

C.

Specify the spine nodes as route reflectors

D.

Associate the correct contract to the L30ut.

E.

Configure an MP-BGP area.

Refer to the exhibit.

The FCoE traffic fails to traverse the vfc2 interface. The VSAN 102 is configured for vfc2. Which action resolves the issue?

A.

Enable LLDP on the interface vfc2

B.

Activate DCBX on the N9K switch

C.

Activate DCBX on the interface e101/1/2

D.

Enable LLDP on the neighbor switch

A host connected to port Eth0/1 on the Cisco Nexus Series Switch received this error

*Mar 6 12 57 42 882 %PM-4-ERR DISABLE psecure-violation error detected on Eth0/1, putting Eth0/1 in err-disable state-Mar 6 12 57 42 882 %PORT_SECURITY-2-PSECURE_VIOLATION Security violation occurred, caused by MAC address a526 cc69 3503 on port EthernetO ' 1.

The server administrator concluded that the issue was caused by plugging the host in the wrong switch port and fixed the problem Which action must be taken to recover the port from the error?

A.

Install ENHANCED_LAYER2_PKG license

B.

Enable NET\V0RK_SERV1CES_PKG license.

C.

Shut and no shut the interface Eth0/I.

D.

Change the interface Eth0/1 mode to access

Refer to the exhibit. An engineer is troubleshooting an issue with the Cisco ACI fabric discovery. During the Cisco APIC initialization, the infra VLAN was set to 4, and the TEP pool was configured to use subnet 11.0.0.0/16. Which action resolves the issue?

A.

Connect the Layer 2 switch to Leaf-101 and Leaf-102.

B.

Connect the Cisco APIC directly to Leaf-101.

C.

Set the Enable LLDP flag on Cisco APIC CIMC.

D.

Set the TEP pool to subnet 10.0.0.0/16.

The Cisco UCS Manager fails to integrate with Cisco Intersight. The requirement is to monitor and configure the UCS environment from UCS Manager as well as Cisco Intersight. However, Cisco Intersight can monitor only the managed devices. Which action resolves the issue?

A.

Set the Access Mode of Intersight Connector on the UCS to Allow Control.

B.

Allow Cisco IMC IP addresses of all the managed servers to reach Cisco Intersight.

C.

Update the NTP settings on all the devices that Intersight manages to be in the same time zone.

D.

Change the configured DNS server to resolve the Cisco Intersight IP address.

Refer to the exhibit.

A certificate is implemented on the security configuration on the Cisco ACI controller. A customer receives a " Connection Not Secure " error in a browser every time the customer logs in to the Cisco APIC GUI. Which action resolves the issue?

A.

Include a private key with the certificate.

B.

Use a browser that supports keys of 2048 bits.

C.

Configure a corporate certificate authority for the certificate.

D.

Add a 1536-bit key to the APIC GUI.