單項選擇題Cisco FabricPath uses what as a common bridge ID to connected Spanning Tree Protocol bridges? ()

A. C84C·75FA·6000
B. 01005·E11.·2FD
C. C84C·76FA·6000
D. 4000.0000.0001


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which statement describes the XML management interface in Cisco NX-OS Software?()

A.The following XML-based NETCONF operations are supported in NX-OS SoftwarE˙close-session  copy-config  delete-config  and edit-config
B.The following XML-based NETCONF operations are supported in NX-OS SoftwarE˙close-session  copy-config  edit-config  and kill-session
C.NX-OS Software supports up to a maximum of 16 concurrent XML sessions
D.Only show commands are supported via the XML management interface in NX-OS Software
E.The NX-OS implementation of the XML-based NETCONF requires SSH to be used for communication with the device


2.多項選擇題Which three statements best describe HSRP configuration on Cisco Nexus switches?()

A. In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.
B. In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.
C. You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.
D. You can use the show standby command to verify HSRP operation and configuration.
E. If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

3.多項選擇題Which three statements describe the configuration change management feature in DCNM LAN? ()

A. Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
B. DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
C. You can archive a maximum of 50 configuration versions per managed device.
D. Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
E. Device-running configuration will be archived only if it differs from the last archived version.

4.單項選擇題

Nexus# conf t 
Enter configuration commands, one per line. End with CNTL/Z. 
Nexus(config)# interface Loopback10 
% Permission denied  Nexus(config)# ? 
no Negate a command or set its defaults 
username Configure user information. 
end Go to exec mode 
exit Exit from command interpreter 
What is the reason why this user is not able to enter configuration commands?()

A. The user did not enter enable prior to going into configuration mode.
B. The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.
C. The user RBAC role is set to network-operator.
D. The user failed authentication and user access defaulted to read-only mode.
E. The AAA server is currently not responding.

5.多項選擇題Which three statements describe user authentication in Cisco DCNM-LAN? ()

A. Cisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.
B. A Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.
C. Cisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.
D. Cisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.
E. Cisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.

6.多項選擇題Which three statements about the DHCP snooping feature on Cisco Nexus switches are true? ()

A. DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.
B. When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.
C. The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
D. Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
E. Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.

7.單項選擇題Overlay Transport Virtualization (OTV) uses the Authoritative Edge Device (AED) to perform which tasks?()

A. The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
B. The AED is responsible for load balancing all traffic for all VLANs across the transport network.
C. The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
D. The AED is responsible for MAC address dispute contention for a given VLAN.

8.單項選擇題Which statement best describes ACL configuration using configuration session mode on Cisco Nexus switches?()

A. The verify command will validate commands entered for syntax errors.
B. The save command will save the commands entered to the startup configuration.
C. The network administrator can perform a dry-run ACL configuration by verifying the configuration against the hardware and software resources available before applying it.
D. Configuration sessions can be saved and resumed at any time, even after upgrading NX-OS Software on the switch with ISSU.
E. Configuration sessions are global for all VDCs on the Nexus 7000.

9.單項選擇題What is the benefit of using Anycast RP via RFC 4610 for IP multicast RP redundancy?()    

A. Improves convergence of the multicast network due to enhanced RPF checks
B. Simplifies the number of control plane protocols over other RP redundancy methods
C. Eliminates the use of Protocol Independent Multicast (PIM) in the topology
D. Increases the administrative distances in Multicast Source Discovery Protocol (MSDP) configuration

10.單項選擇題

2012 Feb 23 23:00:08.676710 pim: [16132] (default-base) Received unauthenticated hello- message from 10.1.1.2 on Ethernet1/18, message discarded 2012 Feb 23 23:00:12.528763 pim: [16132] (default-base) Send Hello with AH on Ethernet1/18 from 10.1.1.1, holdtimE. 105 secs,dr-priority:1 
You are troubleshooting a PIM neighbor adjacency that is not coming up. You issued the command show ip pim neighbor e1/18 and confirmed there is no PIM neighbor on the interface. What is the problem based on the debug output?()

A. The peer router 10.1.1.2 has PIM disabled on its interface connecting to Ethernet1/18.
B. The peer router 10.1.1.2 has the wrong PIM password configured on its interface connecting to Ethernet1/18.
C. The local router 10.1.1.1 has the wrong PIM password configured on Ethernet1/18.
D. The peer router 10.1.1.2 does not have PIM hello authentication enabled on its interface connecting to Ethernet1/18.
E. The local router 10.1.1.1 does not have PIM hello authentication enabled for Ethernet1/18.

最新試題

Which of the following are supported in Cisco Global Site Selector? ()

題型:多項選擇題

Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()

題型:單項選擇題

Refer to the exhibit.The Cisco UCS domain is operating in switching mode. A network administrator notices that no traffic is traversing the uplinks on Fabric Interconnect B (Path C).  Which actions might be used to change this behavior?()

題型:單項選擇題

In a Cisco Unified Computing System, What is the "designated receiver" port in end-host mode used for?()

題型:單項選擇題

When will an "all configuration" backup be imported into the Cisco UCS Manager?()

題型:單項選擇題

What is required for Cisco UCS C-Series rack server integration with Cisco UCS Manager?()

題型:多項選擇題

In the event of a GSS failure in a GSS cluster, which is true?()

題型:單項選擇題

Refer to the exhibit.Your company requires a Cisco UCS configuration that will, at a minimum, allow the configuration in the provided exhibit.  Which Cisco UCS components will meet the requirement?()

題型:多項選擇題

Which GSS "source access list" is used to allow access to GSS by clients when GSS is being used as the DNS?()

題型:單項選擇題

A Cisco Application Control Engine Appliance (ACE) non-admin context does not support "sticky" configuration. What is the reason for this issue?()

題型:單項選擇題