DUMPS BASE
EXAM DUMPS
CISCO 400-151
28% OFF Automatically For You CCIE Data Center Written Exam
1.Which multicast destination MAC address is assigned to LACP? A. 01:80:c2:00:00:03 B. 01:80:c2:00:00:01 C. 01:80:c2:00:00:02 D. 01:80:c2:00:00:04 Answer: C
2.While using HSRP, if you see the active state of the devices constantly changing, which parameter may need to be adjusted? A. Delay B. Hold time C. priority D. standby group Answer: B
3.Which description of how to enable the Flex Flash Controller auto-synu function on the B200M4 blade is true? A. Enable auto-sync in the servers>inventory>storage sub tab. B. Configure a storage policy for FX3S C. Configure a storage connection policy to use auto-sync. D. Configure a local disk policy for Flex Flash Answer: A
4.The OS team has requested that you expand the receive queues of an existing server. Which action accomplishes this change? A. Reconfigure the default vNIC behavior. B. Configure and apply a custom LAN connectivity policy. C. Configure and apply a custom adapter policy. D. Reconfigure the vNIC to the requested queue size. Answer: C
5.Refer to the exhibit.
Using GET method with this XML code, which two pieces of information about Application Policy Infrastructure Controllers shows the output? (Choose two)
A. Ports of the leaves where the APICs are connected. B. Number of network interfaces of each APIC. C. Admin status for each APIC in the cluster. D. Hard disks status for each APIC in the cluster. E. APIC version installed on each node. F. Serial number of each APIC in the cluster. Answer: C F
6.Drag and drop the correct functional components from left to its description on right.
Answer:
7.Drag and drop the MST Spanning Tree protocol standards from left onto the correct characteristic on the right.
Answer:
8.Drag and drop the spanning tree protocol standards from left onto the correct characteristics on the right?
Answer:
9.Which of the following are two possible upgrade states for a node in ACI? (Choose two) A. CompleteNOK B. Upgrading C. Failed D. ComepleteOK
E. Aborted Answer: A D
10.Which two prerequisites for BFD are true? (Choose two) A. For layer 3 port channels used by BFD, you must enable LACP on the port channel. B. Install NETWORK_SERVICE_PKG license. C. Disable the IP packet verification check for identical IP source and destination addresses. D. Enabled ICMP redirect messages on BFD-enabled interfaces. E. For layer 2 port channels used by BFD, you must disable LACP on the port channel. Answer: A C
11.Which of the following statement regarding multi-pod deployment is true? A. TEP pools are used for layer 2 communication between the pods. B. Each pod is assigned a separate and not overlapping TEP pool. C. TEP pool are nit redistributed to the leaf nodes as they are only limited to spines. D. Each pod selects its own TEP pool as its locally significant. Answer: B
12.Refer to the exhibit.
A virtual machine in the EPG “clients” is unable to communication via ICMP with a virtual machine in the EPG “server” which option is the most likely cause of this issue?
A. No contract is configured between the two EPGs. B. There is no issue because the configuration rules permit ICMP traffic C. The EPG “server” is providing the relevant contract but the EPG “clients” is not consuming the contract. D. Not enough details is provided in the output to determine the exact cause. Answer: A
13.Refer to the exhibit.
Which two options must be configured on the Layer 3 Gateway switches to isolate the HSRP between the two data centers? A. ARP inspection filter that block the HSRP GARPs. B. Port access control list on the DCI port-channel that block the HSRP control traffic. C. Routed access control list on the DCI on the SVIs that blocks the HSRP control traffic D. VLAN access control list that blocks the HSRP control traffic E. Disable HSRP GARP on the SVIs for the VLANs that move across the DCI. Answer: B E Explanation: Source: https://www.cisco.com/c/en/us/support/docs/switches/nexus-7000-seriesswitches/118934-configure-nx7k-00.html Text from Source: In this scenario, the Layer 3 (L3) gateway is configured on the same vPC pair and acts as the DCI. In order to isolate the HSRP, you must configure a Port Access Control List (PACL) on the DCI port-channel and disable HSRP Gratuitous Address Resolution Protocols (ARPs) (GARPs) on the Switched Virtual Interfaces (SVIs) for the VLANs that move across the DCI
14.When an administrator uses the commit command to activate the change to the call home configuration, it results in an error.
Which statement is true? A. Cisco Fabric service must be disable for this command to work. B. Cisco Fabric service must be enabled for this command to work. C. This commit commend is not required. D. The commit callhome command must be used. Answer: B
15.Refer to the exhibit.
An admin has created a new EPG in an ACI fabric. The admin then specified static path binding as show in exhibit after submitting this policy configuration, the admin noticed that this newly created EPG had the fault shown in the exhibit. Which option is the likely explanation of the fault? A. There is no fault. The fault is currently in the soaking state and the fault will automatically clear and everything will work as expected. B. There is not enough information to determine the cause of the problem. C. The admin incorrectly configured this static path a “trunk� when it should have been configured as an access(untagged)port. D. The encap VLAN configured is not within the allow range of VLANs as specified by the associated domain. Answer: D
16.Which ports are affected by enabling BPDU Guard globally? A. Operational spanning tree network ports. B. All operational spanning tree ports. C. Operational spanning tree normal ports. D. Operational spanning tree edge ports. Answer: D
17.Which method is the best way to troubleshoot a specific workflow execution in UCSD? A. Open the infrastructure log. B. Enabled debug log first, then check the infrastructure logs. C. Check the specific SR log. D. Generate tech-support and submit it to the TAC workflow analysis tool. Answer: C
18.Object configJob contains which of the following information? A. Passphrase B. Admin state C. Next object name D. Field lastStepDesor Answer: D
19.Which two options are common PTP device types? (Choose two) A. Network clock B. Sundals C. Boundary clock D. Transparent clock E. Crystal clock Answer: C D
20.Refer to the exhibit.
After you upgrade Cisco USC firmware, some of your blades have these error messages. Which description of the problem is true? A. Storage provisioning is not configured. B. Service profile requires a connectivity policy. C. vNIC template must be converted to updating. D. Some components are deprecated. Answer: B
21.Which option is required by atomic counters to be leveraged in troubleshooting endpoint connectivity? A. Endpoints must connect to the same leaf switch. B. Endpoints must be in different bridge domains. C. Endpoints must be in different endpoint groups. D. Endpoints must be in different VRFs. E. Endpoint must connect to different leaf switches. Answer: E
22.Which two components are the responsibility of the customers in a platform as a service offering? (Choose two) A. APIs B. Infrastructure connectivity C. Hardware
D. Applications. E. Data. Answer: B E Explanation: Doubt: Some experts say D E while some go for B E
23.A network architect must migrate the legacy infrastructure switches of a customer from a Cisco Nexus 9000 platform. Which process helps achieve this milestone? A. Create a container providing separate execution space. B. Allow guest temporary access to the CLI without logging in. C. Manage software upgrades via guest shell. D. Set up a web-based interface for configuration management. Answer: A Explanation: Doubt: Some experts say A while some go for D
24.An IoT solution is more likely to generate a lot of analytics and data. Which of the following enables this information to be analyzed and managed through integration with 3rd party devices and applications? A. Prime infrastructure B. IP67 C. API D. ASR Answer: C Explanation: Doubt: Some experts say A while some go for C.
25.Which protocol does NX-API use as its transport? A. SFTP B. SCP C. HTTP/HTTPS D. FTP E. SSH Answer: C
26.Which three of the following are key components to provide network connectivity to an loT Solution? (Choose three) A. Wireless
B. Voice C. Routing D. Switching E. Service provider F. Firewalling Answer: A E F Explanation: Doubt: Some experts say A C E while some go for A E F.
27.Which description of hybrid SDN framework is true? A. The data plane is pulled from the networking element and put in an SDN controller. B. The control plane and data plane are pulled from the networking element and put in an SDN controller and SDN agent. C. The control plane is pulled from the networking element and put in an SDN controller. D. The control plane function is split between a SDN controller and the networking element. Answer: D
28.Which two statements about CFS are true? (Choose two) A. After enabling CFS, a network-wide lock is applied to NTP whenever an NTP configuration is started and released once after the change has been committed B. CFS distribute the local NTP configuration to the master only which then forward it to all device in network C. if CFS is used to distribute NTP, all device in the network must have different VRFs configured the ones use for NTP D. CFS require a license to be installed before it can used distribute NTP E. You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS device across the network Answer: A E
29.Which three issues can cause OSPF neighbors to not be able to establish an adjacency? (Choose three) A. Hello value B. OSPF instance Tag C. MTU D. interface cost in not set E. PIM F. duplicate RIDs G. Feature Multicast not enabled
Answer: A C F
30.Refer to the exhibit.
Drag and drop the object on the left to their correct description on the right.
Answer:
31.Refer to the exhibit.
Health score can be aggregated for a variety of areas such as for the system infrastructure tenants application or services which health score level is the exhibit from APIC GUI an example of? A. Tenant B. Pod C. Managed object D. system Answer: B Explanation: Doubt: Some experts say B while some go for C.
32.Under which two policies is ACI allowed to configure management protocols such as SNMP and SYSLOG? A. VMM Domain B. Visibility & Troubleshooting C. Fabric D. Tenant E. Trunk Answer: C D
33.For which two multicast distribution modes is RP configuration required? (Choose two) A. ASM B. BIDIR C. UDIR
D. SSM E. RPF routes for multicast Answer: A B
34.Drag and drop the nx-api request elements from left onto the correct Functions/characteristics on the right.
Answer:
35.If FCoE capability is disabled between the switch and adapter, which result is true? A. The switch accepts only tagged frames from the adapter. B. The switch accepts only untagged frames from the adapter. C. The VLAN ID field is always set to 0. D. Ethernet frames sent to the adapter do not indude IEEE 802.1Q tags Answer: D
36.Your IT Company has been tasked to automate their view of the environment. The CTO has instructed you to use ansible to focus on value-added task. Which four integrations do you use to achieve this outcome? (Choose Four). A. Kubemetes B. virtualization C. infrastructure D. containers E. DevOps tools F. management applications G. networks Answer: C D E G
37.Which statement about micro segmentation with ACI is true? A. It is supported only for virtual devices B. It enables to automatically assign endpoints to logical security zones called endpoint groups C. It is supported only for physical devices D. It enables to automatically assign endpoints to one centralized security zone that is created by default for the whole fabric. Answer: B
38.Which is the recommended QoS best practice to classify and mark traffic? A. closest to the traffic source B. at the destination C. core layer D. distribution layer Answer: A
39.Which feature must be configured before IP source guard is used successfully in
your network environment? A. DHCP snooping B. Dot1x C. Dynamic ARP Inspection D. port security Answer: A
40.Which statement about vxlan is true? A. Data-plan traffic traverse the underlay network. B. Control-plane traffic traverses the underlay network C. Data-plan traffic traverse the overlay network D. Control-plane traffic traverses the overlay network Answer: C
41.Which two steps only allow access to the supplier management database application in EPG “DB-EPG” through VPN connection using subnet 10.10.10.0/16? (Choose two) A. Create an external network under L3Out Add subnet 10.10 10.0/16 with scope "External Subnets for the Extremal EPG” B. Create an EPG and name it "VPN-Access” Create a bridge domain with subnet 10.10.10.1/16 and associate it with "VPN-Access EPG Create a contract as "Provider Contract” in EPG C. Assign a contract as "Provider Contract in DB-EPG D. Assign a contract as "Consumer Contract” in an extemal network under L2out. E. Create an EPG and name it "VPN-Access” Create a bridge domain with subnet 10.10.10.0/16 and associate it with "VPN-Access" EPG.Create a contract as "Provider Contract” in EPG Answer: A C
42.Which statement about when vmware vsphere distributed switch is created is true? A. The quarantine port group default policy is to allow all ports B. When a service graph is deleted, the service VMs are manually moved to the quarantine port group by administrator of APIC C. A quarantine port group is created by default. D. Port group assignments are retained in the quarantine port group Answer: C
43.In which three ways can you house Edge transport servers on their perimeter network in ACI without investing extra cost in buying additional hardware? (Choose
three). A. Create Contracts to enforce policy between Edge Transport servers EPG and backend mailbox servers EPG B. Create a private VRF with default enforcement policy. Configure a bridge domain with a subnet assigned to a private VRF C. No need to create Contracts. A default enforcement policy allows all traffic to forward D. Create an L3Out to route peer with an ASA firewall to isolate traffic with security rules E. Choose options "Shared Route Control Subnet" and "Shared Import Security Subnet� Answer: A D E
GET FULL VERSION OF 400-151 DUMPS
Powered by TCPDF (www.tcpdf.org)