Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the exhibit. An administrator connects a Cisco Nexus Series to the Cisco ACI fabric. The connectivity must allow Cisco Discovery Protocol LLDP, and LACP. Which action enables the protocols between Switch-1 and the ACI leaf switches?

A.

Enable an existing interface selector.

B.

Implement an interface policy group.

C.

Configure an interface profile.

D.

Activate a leaf interface.

An engineer must configure a Fibre Channel port channel on a Cisco Nexus 9000 Series Switch. The configuration must meet these requirements:

    A port-channel protocol negotiation is performed with the peer ports.

    The trunk mode must be explicitly configured for the interfaces.

    VSANs from 10 to 20 must be allowed.

Which command set configures the devices to meet the requirements?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer is implementing a Cisco ACI fabric and must use static VLAN range as part of a VMM deployment. The static VLAN must be incorporated into the dynamic VLAN pool. The existing VLAN pool is set for dynamic allocation. Which action accomplishes this goal?

A.

Add the VLAN to the pool configured with Inherit Allocation Mode from parent.

B.

Change the existing VLAN pool to static allocation mode.

C.

Add a static VLAN allocation range to the VLAN pool.

D.

Create a static reservation within the dynamic VLAN pool.

A Cisco UCS user called " Employee1 " accidentally changed the boot policy of the Cisco UCS server at the Cisco UCS Manager root level. This change impacted all service profiles and their storage connectivity was lost. The system administrator wants to prevent this issue from recurring in the future. The new security policy mandates that access must be restricted up to the organization level and prevent other users from modifying root policies. Which action must be taken to meet these requirements?

A.

Modify the privilege level assigned to the user.

B.

Define a custom user role and assign it to users.

C.

Assign the user " Employee 1 " the network-operator role.

D.

Assign users to a specific Cisco UCS locate.

An engineer must back up the Cisco UCS configuration. The backup job must meet these requirements:

• It must use the TCP protocol.

• Client identification must be verified before data is transmitted.

• The backup must contain all the system and logical configuration settings.

• The operations team requires that the backup file is in a human-readable format.

Which set of configurations must the engineer use?

A.

Type: System configurationProtocol: SFTP

B.

Type: Logical configurationProtocol: TFTP

C.

Type: All configurationProtocol: SCP

D.

Type: Full stateProtocol: SFTP

All logins to a Cisco Nexus 9000 Series Switch must pass through the TACACS+ server at IP address 192.168.10.10. The configuration must meet these requirements:

• The TACACS+ server must be used for SSH and Telnet.

• The TACACS+ server key must be Cisco123!.

• Management VRF must be used for connectivity.

• The deployment must fail back to local credentials if the TACACS+ server fails to respond within 30 seconds.

Drag and drop the code snippets from the right onto the blanks in the code on the left to complete the configuration. Not all code snippets are used.

What occurs when running the command install deactivate

< filename > while a software maintenance upgrade is performed on a Cisco Nexus 9000 Series switch?

A.

The current set of packages is committed.

B.

The package is removed from the switch.

C.

The package features for the line card are disabled.

D.

The current upgrade stops.

An engineer must apply AAA configuration on a Cisco MDS 9000 Series Switch The solution must meet these conditions :

    It must use a challenge-response authenticator protocol that uses MD5 hashing with an incrementally changing identifier

    The RADIUS configuration must be automatically shared with other MDS switches in the environment

The RADIUS server is already defined. Which command set completes the configuration?

A)user naed

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Refer to the exhibit. SVR-A in EPG-A/BD-A fails to reach SVR-B in EPG-B/BD-B. Which two conditions should be verified to analyze the traffic between the two EPGs? (Choose two.)

A.

A contract exists between EPG-A and EPG-B and allows the traffic.

B.

Limit Endpoint Learning is disabled on the bridge domain for EPG-B.

C.

SVR-B is learned as an endpoint in EPG-B from Node-112.

D.

EPG-A and EPG-B are excluded from the preferred group.

E.

The bridge domain for EPG-B floods ARP packets.

Which storage technology provides a simple, high-capacity solution and offers a direct file-access level to the shared storage?

A.

NFS

B.

iSCSI

C.

FCoE

D.

FCP