多項(xiàng)選擇題

Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration ()
port-profile type Ethernet name VM-Data 
vmware port-group 
switchport mode trunk 
switchport allowed vlan 400-410 
channel-group auto mode active 
no shut  
state enabled 

  

A. Cisco UCS fabric interconnects
B. Pair of N5K’s in VPC
C. Standalone N5K
D. Pair of N5K’s in non-VPC
E. Cisco Catalyst 6000 Switch in VSS


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? ()
VSM-PRI-188# sh int vethernet 5 
Vethernet5 is up 
Port description is VM001, Network Adapter 2 

HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) 
Owner is VM "VM001", adapter is Network Adapter 2 
Active on module 5  
VMware DVS port 484  
Port-Profile is VM-vlan-10  
Port mode is access 
   

VSM-PRI-188# sh int vethernet 6  
Vethernet6 is up 
Port description is VM002, Network Adapter 1 
HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) 
Owner is VM "VM002", adapter is Network Adapter 1 
Active on module 5  
VMware DVS port 485  
Port-Profile is VM-vlan-10  
Port mode is access 

  

A. Monitor session 1 type span       Source interface veth5 both      Destination interface veth6      No shut
B. monitor session 1      source vlan 10      destination interface veth6      no shut
C. monitor session 1 type er-span      source interface vlan 10      destination ip 10.1.1.10      no shut
D. VM002 must be removed from the Nk1V
E. Move VM002 to Module 5
F. Restart the VEM on module 5

2.多項(xiàng)選擇題DHCP snooping on Cisco Nexus 1000V Series Switches acts like a firewall between untrusted hosts and trusted DHCP servers by doing which of these? ()

A. validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
B. intercepts all ARP requests and responses on untrusted ports
C. builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
D. uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
E. limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry

4.多項(xiàng)選擇題What are the four vPath packet flow steps? ()

A. perform flow lookups
B. intercept packets on service enabled ports
C. run packets through the vPath flow manager
D. classify the packets
E. flow manager emits an action for the packets
F. enforce the action determined by the flow manager

最新試題

Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()

題型:多項(xiàng)選擇題

Which statement is true about "full state backup" in a Cisco Unified Computing System?()

題型:單項(xiàng)選擇題

What is required for Cisco UCS C-Series rack server integration with Cisco UCS Manager?()

題型:多項(xiàng)選擇題

Which of the following are supported in Cisco Global Site Selector? ()

題型:多項(xiàng)選擇題

Which three statements are possible causes for the "fltAdaptorHostIfLink-down" fault in UCS Manager? ()

題型:多項(xiàng)選擇題

Refer to the exhibit.The Cisco UCS domain is operating in switching mode. A network administrator notices that no traffic is traversing the uplinks on Fabric Interconnect B (Path C).  Which actions might be used to change this behavior?()

題型:單項(xiàng)選擇題

When testing ICMP access to a functional load-balancing ACE VIP, it fails. What is the reason of this problem? ()

題型:多項(xiàng)選擇題

In a Cisco Unified Computing System, where are SAN port channels connected to?()

題型:單項(xiàng)選擇題

An administrator creates a vNIC and assigns it to Fabric A with the fabric failover feature enabled. Which statement is true?()

題型:單項(xiàng)選擇題

In the event of a GSS failure in a GSS cluster, which is true?()

題型:單項(xiàng)選擇題