Cisco Data Center Architecture Set 1

When creating a QoS policy dialog box in Cisco UCSM, which four fields can be modified?


Options are :

  • rate
  • best-effort
  • host control
  • name
  • burst

Answer : rate host control name burst

400-101 CCIE Routing and Switching Written Practice Exam Set 5

Which two options describe the results of a switch sending an RCF SW_ILS frame to neighbor switches?


Options are :

  • All traffic in all VSANs is suspended.
  • New Fibre Channel domains can be allocated.
  • The switch name is changed.
  • Zone merging is reinitiated.
  • The principal switch remains the same.

Answer : New Fibre Channel domains can be allocated. Zone merging is reinitiated.

Which two statements about Fibre Channel Class 2 are true?


Options are :

  • Fibre Channel Class 2 provides a connection-oriented class of service.
  • The F_BSY frame is part of Class 2.
  • BB_Credits do not exist in Class 2.
  • Dedicated bandwidth is allocated when using Class 2.
  • Class 2 acknowledges frame delivery.

Answer : The F_BSY frame is part of Class 2. Class 2 acknowledges frame delivery.

Which three are valid methods to monitor and trend SAN port channels with DCNM?


Options are :

  • configure traps for each port channel to utilize RMON "Leading the way in IT Testing & Certification Tools" - www.testking.com 190 Cisco 350-080 Exam
  • for each port channel, select Monitor Continually
  • from the DCNM-SAN client, view ISLs in real time from the Performance drop-down list
  • set up flows with the DCNM-SAN client and use the Performance Manager web client for performance collections
  • use summary view in the device manager

Answer : from the DCNM-SAN client, view ISLs in real time from the Performance drop-down list set up flows with the DCNM-SAN client and use the Performance Manager web client for performance collections use summary view in the device manager

200-105 Inter connecting Cisco Networking Devices Exam Set 5

How many VSM modes are there in a Cisco Nexus 1000V environment?


Options are :

  • 5
  • 3
  • 0
  • 4
  • 1
  • 2

Answer : 3

Which of the following is an advanced networking function performed by VEM?


Options are :

  • VLAN pruning.
  • Snooping.
  • VSAN creation.
  • QOS.

Answer : QOS.

Which command will allow you to display the configured QoS group and the ingress buffer allocated to each QoS group?


Options are :

  • show policy-map system type queuing
  • show policy-map interface ethernet type queuing
  • show interface priority-flow-control
  • show interface queuing
  • show queuing interface

Answer : show queuing interface

210-260 Implementing Cisco Network Security Practice Exam Set 8

A VSM is actually a virtual machine that requires how many vNICs for functioning?


Options are :

  • 3
  • 0
  • 1
  • 4
  • 2

Answer : 3

Which statement best describes the Cisco Nexus 1000V Series?


Options are :

  • The Cisco Nexus 1000V Series provides Layer 2 and Layer 3 switching, advanced networking functions, and a common network management model in a virtualized server environment.
  • The Cisco Nexus 1000V Series provides Layer 2 switching, advanced networking functions, and a common network management model in a virtualized server environment.
  • The Cisco Nexus 1000V Series provides Layer 2 and Layer 3 switching but does not provide advanced networking functions or a common network management model in a virtualized server environment.
  • The Cisco Nexus 1000V Series provides Layer 3 switching, advanced networking functions, and a common network management model in a virtualized server environment.

Answer : The Cisco Nexus 1000V Series provides Layer 2 switching, advanced networking functions, and a common network management model in a virtualized server environment.

Which two methods can be used in communications between the Cisco Nexus 1000V VEM and the VSM?


Options are :

  • routed UDP traffic using port 7845
  • routed TCP traffic using port 7845
  • routed TCP traffic using port 4785
  • routed TCP traffic using HTTPS
  • Layer 2 direct traffic using MAC addresses
  • Layer 2 broadcast traffic
  • routed UDP traffic using port 4785

Answer : Layer 2 direct traffic using MAC addresses routed UDP traffic using port 4785

100-105 Net Cert Interconnecting Cisco Networking Exam Set 4

What are the three prerequisites for enabling FCoE on a Cisco Nexus 7000?


Options are :

  • NPIV feature
  • FCoE module license
  • F Series module
  • M Series module
  • no-drop QoS policy
  • Fabric Extender configured

Answer : FCoE module license F Series module no-drop QoS policy

Regarding disk scrub, which two of these occur to the data on any local drives upon disassociation?


Options are :

  • If disk scrub is enabled, all the data access on any local drives is destroyed.
  • If disk scrub is enabled, the LSI active RAID is destroyed but data is still preserved.
  • If disk scrub is enabled, all BIOS settings for the server are erased.
  • If disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.
  • If disk scrub is enabled, all data on any local drives is preserved, including the local storage configuration.

Answer : If disk scrub is enabled, all the data access on any local drives is destroyed. If disk scrub is disabled, all data on any local drives is preserved, including the local storage configuration.

Which two statements about Fibre Channel over IP are true?


Options are :

  • FCIP links consist of a maximum of one TCP connection between two FCIP link endpoints.
  • The FCIP link is established between two peers, and the VE Port initialization behavior is identical to a normal E Port.
  • The local IP address of the FCIP profile is the IP address of the management interface of the Cisco MDS switch.
  • The FCIP profile contains information about the local IP address and TCP parameters.
  • Each FCIP link carries encapsulated FCoE frames.

Answer : The FCIP link is established between two peers, and the VE Port initialization behavior is identical to a normal E Port. The FCIP profile contains information about the local IP address and TCP parameters.

400-101 CCIE Routing and Switching Written Practice Exam Set 10

What are the four vPath packet flow steps?


Options are :

  • perform flow lookups
  • intercept packets on service enabled ports
  • enforce the action determined by the flow manager
  • classify the packets
  • run packets through the vPath flow manager
  • flow manager emits an action for the packets

Answer : intercept packets on service enabled ports enforce the action determined by the flow manager run packets through the vPath flow manager flow manager emits an action for the packets

Which two statements about Cisco Nexus 1000V Series Switches are correct?


Options are :

  • The mgmt0 interface on the VSM does not necessarily require its own VLAN. In fact, you can use the same VLAN to which the VMware vCenter Server belongs. The VSM management VLAN is really no different from any other virtual machine data VLAN. Alternatively, network administrators can designate a special VLAN for network device management.
  • The service console is a critical interface that resides on every logical server.
  • Always deploy the Cisco Nexus 1000V Series VSM in pairs, with one VSM that is defined as the primary module and the other that is defined as the secondary module on two separate hosts.
  • When VSM interfaces are created for a virtual machine, the VMware vSwitch port-group configuration is used initially, which requires the creation of a port-group name for these interfaces and an appropriate VLAN. The simplest configuration is to create a single port group (for example, VSM-Interfaces), that includes all the interfaces that use this port group and the same VLAN.

Answer : The mgmt0 interface on the VSM does not necessarily require its own VLAN. In fact, you can use the same VLAN to which the VMware vCenter Server belongs. The VSM management VLAN is really no different from any other virtual machine data VLAN. Alternatively, network administrators can designate a special VLAN for network device management. Always deploy the Cisco Nexus 1000V Series VSM in pairs, with one VSM that is defined as the primary module and the other that is defined as the secondary module on two separate hosts.

When using VSD, traffic flow goes from the virtual machine to which of these?


Options are :

  • Service virtual machine
  • Virtual Supervisor Module
  • VMware vSwitch
  • VMware distributed switch
  • Upstream switch

Answer : Service virtual machine

400-101 CCIE Routing and Switching Written Practice Exam Set 8

The Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS Software operating system. Together with the VMware ESX hypervisor, the Nexus 1000V supports Cisco VN-Link server virtualization technology, which provides mobile virtual machine security and network policy for VMware View components, including the DHCP snooping feature. DHCP snooping is disabled on the Nexus 1000V by default. When the DHCP snooping feature is enabled on the Nexus 1000V, what are the default trust settings for the vEthernet and uplink ports?


Options are :

  • All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.
  • All vEthernet ports are not trusted, and all Ethernet ports such as uplinks and port channels are not trusted.
  • All vEthernet ports are trusted, and all Ethernet ports such as uplinks and port channels are trusted.
  • All vEthernet ports are trusted and all Ethernet ports such as uplinks and port channels are not trusted.

Answer : All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.

Which two statements about NPIV are true?


Options are :

  • NPIV requires the Enterprise License Package.
  • NPV devices log in to NPIV devices.
  • A director class switch should not be placed into NPIV mode.
  • NPIV is supported on the Cisco MDS, N7K, and N5K families of switches.
  • After enabling NPIV, switch interfaces can only be placed into NP, F, or SD modes of operation.

Answer : NPV devices log in to NPIV devices. NPIV is supported on the Cisco MDS, N7K, and N5K families of switches.

When an NP port becomes operational, the NP switch first logs itself into the core switch by sending a FLOGI request (using the port WWN of the NP port). What will occur next?


Options are :

  • The switch will register parameters using FDISC.
  • The NPV switch will perform a PLOGI using FDISC to register with the fabric name server.
  • The switch registers with the fabric name server.
  • The switch will perform a PLOGI to the port login server.

Answer : The switch registers with the fabric name server.

210-260 Implementing Cisco Network Security Practice Exam Set 1

vPath is a critical component in the VNS architecture. Which two are functions of vPath?


Options are :

  • intelligent traffic steering to the VNMC
  • offloading the processing from the VSG to the flow manager
  • intelligent traffic steering to the VSG
  • offloading the processing from the VSG to the VEM
  • deep packet inspection

Answer : intelligent traffic steering to the VSG offloading the processing from the VSG to the VEM

Which option describes the default roles available to RBAC on Cisco Nexus switches?


Options are :

  • admin and read-only
  • admin, read-only, network-admin, and network-operator
  • vdc-admin, vdc-operator, network-admin, and network-operator (for Nexus 7000) and network- admin and network-operator (for other Nexus switches)
  • admin, operator, network-admin, and network-operator
  • vdc-admin, vdc-operator, network-admin, and network-operator

Answer : admin, operator, network-admin, and network-operator

What is the use of NPV in Cisco Unified Computing Systems?


Options are :

  • Support for increased number of VSANs
  • Reduce domain IDs in a Fibre Channel environment
  • Compatibility with third-party Fibre Channel switches
  • Faster throughput
  • Support for SAN port channels

Answer : Reduce domain IDs in a Fibre Channel environment Compatibility with third-party Fibre Channel switches

200-125 Cisco Certified Network Associate (CCNA) Exam Set 5

The Cisco Nexus 1000V Series implementation has two main components. Which two components together make up the Cisco Nexus 1000V Series Switch?


Options are :

  • virtual Ethernet module
  • virtual machine NICs
  • virtual supervisor module
  • virtual machine kernel NICs

Answer : virtual Ethernet module virtual supervisor module

Which three parameters are carried by an iSCSI TCP session?


Options are :

  • SCSI commands
  • primitive signals
  • iSCSI PDUs
  • control messages
  • parameters that specify redundant paths

Answer : SCSI commands iSCSI PDUs control messages

Which port channel command is recommended for N1KV on Cisco UCS?


Options are :

  • channel-group auto mode on sub-group manual
  • channel-group auto mode on sub-group cdp
  • channel-group auto mode on
  • channel-group auto mode active
  • channel-group auto mode on mac-pinning

Answer : channel-group auto mode on mac-pinning

Cisco Data Center Architecture Set 5

When it comes to creating pooled WWN objects, it is important to understand that a Cisco UCS WWN pool can include only WWNNs or WWPNs from which value of ranges?


Options are :

  • from 30:00:00:00:00:00:00:00 to 30:FF:FF:FF:FF:FF:FF:FF
  • from 40:00:00:00:00:00:00:00 to 40:FF:FF:FF:FF:FF:FF:FF
  • from 20:00:00:00:00:00:00:00 to 20:FF:FF:FF:FF:FF:FF:FF
  • from 10:00:00:00:00:00:00:00 to 10:FF:FF:FF:FF:FF:FF:FF

Answer : from 20:00:00:00:00:00:00:00 to 20:FF:FF:FF:FF:FF:FF:FF

Which three statements about the DHCP snooping feature on Cisco Nexus switches are true?


Options are :

  • Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.
  • The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
  • DHCP snooping commands are not available until the feature is enabled with the feature dhcpsnooping command.
  • Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
  • When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.

Answer : Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature. The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN. When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.

Why is a Cisco UCS B250 server unable to support 16-GB DIMMs?


Options are :

  • The memory bus would be too long.
  • Dual-rank DIMMs are not supported.
  • 16-GB DIMMs are too slow.
  • The largest DIMM an Intel 55xx or 56xx CPU can address is 32 GB.
  • The blade would run too hot.

Answer : The largest DIMM an Intel 55xx or 56xx CPU can address is 32 GB.

Cisco 210-060 Implement Collaboration Device Practice Exam Set 3

DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these?


Options are :

  • validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
  • intercepts all ARP requests and responses on untrusted ports
  • uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
  • builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
  • limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

Answer : validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses

What is the default FSPF cost of a port channel that consists of four 2-Gb/s links, with one link down because of an error?


Options are :

  • 500
  • 1000
  • 166
  • 125
  • 250

Answer : 125

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions