Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A network engineer deploys a cloud service for a customer The customer wants complete control over the underlying operating system data and application Which cloud service model must be used to accomplish this goal?

A.

Infrastructure in a service

B.

storage as a service

C.

platform as a service

D.

software as a service

An engineer must configure a user role interface policy on a Cisco Nexus 9000 Series Switch. The role must prevent access to interface FC3/2 but allow access to interface FC3/1. Which

set of actions must be taken to accomplish this goal?

A.

Configure deny interface policy. Deny interface FC3/2. Permit interface FC3/1.

B.

Configure permit interface policy. Deny interface FC3/2. Deny interface FC3/1,

C.

Configure permit interface policy. Permit interface FC3/2. Permit interface FC3/1.

D.

Configure deny interface policy. Permit interface FC3/2. Deny interface FC3/1.

Refer to me exhibit An engineer is troubleshooting a connectivity issue for a VM with MAC address 00:50:56:88:10:14 running on me cisco UCS-8 Series blade in VLAN 10. Cisco DCS Manager is connected to a Cisco nexus 9000 Series switch over port channel 10. Currently, the VM Is unreachable from any source that Is outside of me Cisco UCS domain. Which action musí be takenlo allow me VM to be readable?

A.

Allow VLAN 10 In the VPC peer link between the Cisco Nexus switches

B.

Allow VLAN 10 In the vSwitch at the hypervisor level.

C.

Allow VLAN 10 In a trunk between the Fabric interconnects and the Cisco Nexus snitches.

D.

Allow VLAN 10 In a trunk between the IOM and the Fabric Interconnects.

Refer to the exhibit. Which command set must be used to complete the configuration that configures a Cisco Nexus 9000 Series server scheduler to perform the backup of It’s configuration every Wednesday at 8:00 am?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which configuration must be used to boot a Cisco UCS C-Series Server using iSCSI?

A.

Configure eth0 as an initiator and configure the VLAN as a trunk.

B.

Set up eth1 as the target and use the remote IQN.

C.

Configure a vNIC as an initiator and target using the IQN and LUN ID.

D.

Implement an iSCSI adapter using the initiator IQN name.

A customer data center experiences bandwidth contention that affects the servers connected to the NPV enabled switch The NPV switch is connected to the NPIV switch using two 10 Gb uplinks but the traffic originating front the connected hosts to the core switch exceeds the available bandwidth The engineers decided to add a third uplink to the NPV server to increase the available bandwidth Which set of commands must be used to provision the new uplink?

A.

switch2(config)# npv auto-load-balance disruptive

! uplink to NPV Core

switch2(config-if)# switchport mode np

B.

switch2(config)# port-channel load-balance ethernet source-dest-port

! uplink to NPV Core

switch2(config-if)# switchport mode np

C.

switch2(config)# npv traffic-map server-interface

! uplink to NPV Core

switch2(config-if)# switchport mode npiv

D.

! uplink to NPV Core

switch2(config-if)# switchport mode npiv

Refer to the exhibit During a vPC peer switch reload, there is packet loss between the server and the router Which action must be taken to prevent this behavior during future reloads?

A.

Set the routed uplink ports of the Cisco Nexus peers as orphans.

B.

Increase the vPC delay restore timer.

C.

Decrease the OSPF hello and dead interval timers.

D.

Disable vPC ARP synchronize on the vPC peers.

A network engineer must enable port security on all cisco MDS series switches in the fabric. The requirement is to avoid the extensive manual configuration of the switch ports. Which action must be taken to meet these requirements?

A.

Activate CFS distribution and the auto-learning port security feature.

B.

Activate CFS distribution and the auto-learning port security feature on a per-VSAN basis.

C.

Enable the auto-learning port security feature on a per-VSAN basis.

D.

Enable the auto-learning port security feature.

Refer to the exhibit. A network engineer must retrieve the network interface name from a JSON object. The engineer loads the JSON into a Python dictionary named json_object. Which code snippet completes the Python script?

A.

Option A

B.

Option B

C.

Option C

D.

Option D

An engineer configures a role for a new user in Cisco UCS Manager The role should allow the user to configure vHBAs, vNICs, and server port types.

Which role should be assigned to allow the engineer to complete this task?

A.

network administrator

B.

operations

C.

server-compute

D.

AAA administrator