Which configuration command set must be applied to meet these requirements?

A network administrator must configure an extra keyring in Cisco UCS Manager. The key must provide a high level of encryption and secure authentication when users use the web interface. Which configuration command set must be applied to meet these requirements? A . Option AB . Option BC . Option...

August 12, 2022 No Comments READ MORE +

Which server policy is used to install new Cisco IMC software on a server?

Which server policy is used to install new Cisco IMC software on a server?A . host firmware policyB . hypervisor firmware policyC . BIOS software policyD . Cisco IMC software policyView AnswerAnswer: A Explanation: https://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-manager/CLI-User-Guides/Firmware-Mgmt/4-0/b_UCSM_CLI_Firmware_Management_Guide_4-0/b_UCSM_CLI_Firmware_Management_Guide_4-0_chapter_01.html# You can use host firmware packages by defining a host firmware policy as an attribute...

August 11, 2022 No Comments READ MORE +

Which command must be implemented to meet these requirements?

An engineer needs to make an XML backup of Cisco UCS Manager The backup should be transferred using an authenticated and encrypted tunnel and it should contain all system and service profiles configuration. Which command must be implemented to meet these requirements? A . Option AB . Option BC ....

August 11, 2022 No Comments READ MORE +

Which action must be performed on Cisco UCS to meet the requirements?

An engineer must implement access control tor Cisco UCS Manager. The configuration must meet these requirements. - 9 All users and user groups must be configured using Active Directory. - 10 User1 must have full access to the Fabric Interconnect infrastructure and network security operations - 11 User1 must have...

August 11, 2022 No Comments READ MORE +

An engineer is implementing security on the Cisco MDS 9000 switch

DRAG DROP An engineer is implementing security on the Cisco MDS 9000 switch. Drag drop the descriptions from the left onto the correct security features on the right. View AnswerAnswer: Explanation: Reference: https://www.cisco.com/en/US/docs/switches/datacenter/nexus5500/sw/san_switching/7x/b_5500_SAN_Switching_Config_7x_chapter_010010.html#con_1170967

August 11, 2022 No Comments READ MORE +

Which configuration set should be applied to complete this task?

A network engineer must create an EEM script that saves a copy of the running configuration on boot flash and writes a message to syslog when a user saves the configuration to a Cisco Nexus switch. Which configuration set should be applied to complete this task? A . Option AB...

August 11, 2022 No Comments READ MORE +

Which configuration must be applied to meet these requirements?

A network engineer needs to configure system logging on the MDS switch. The messages must be displayed with the severity level of "warning” and above. For security reasons the users must be logged out of the console after 5 minutes of inactivity. Which configuration must be applied to meet these...

February 3, 2022 No Comments READ MORE +

Which set of scheduler attributes must be used to meet these requirements?

Refer to the exhibit. An engineer must schedule the firmware upgrade of the Red1 and Red2 leaf switches. The requirement is to keep the upgrade time to the minimum, avoid any service impact, and perform the parallel upgrade. Which set of scheduler attributes must be used to meet these requirements?...

February 3, 2022 No Comments READ MORE +

What configuration will accomplish this task?

AN engineer is asked to modify an overridden policy by changing the number of FCNS database entries to 1500 and then generable a massage . What configuration will accomplish this task? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C Explanation: The following example...

February 2, 2022 No Comments READ MORE +

Which command sequence must be used to accomplish this goal?

An engineer must configure HTTPS secure management for Cisco UCS Manager using a key ring named kr2016 and a key size of 1024 bits. The environment consists of a primary fabric interconnect named UCS-A and a secondary fabric interconnect named UCS-B . Which command sequence must be used to accomplish...

February 2, 2022 No Comments READ MORE +