When a strict CoPP policy is implemented, which statement describes an event during which packets are dropped?

When a strict CoPP policy is implemented, which statement describes an event during which packets are dropped?A . Fifteen SSH sessions remain connected to the switch.B . A large system image is copied to a switch by using the default VRD . A ping sweep is performed on a network...

December 22, 2020 No Comments READ MORE +

what is the result of applying this configuration?

AN engineer enters these commands while in EEM on a Cisco Nexus 9000 Series Switch. event manager applet Backup-config event timer watchdog time 1800 name timer event cli match “copy running-config startup-config” what is the result of applying this configuration?A . It saves the running configuration every 1800 seconds.B ....

December 22, 2020 No Comments READ MORE +

APIC EPG Resolution Immediacy is set to “Immediate” Which statement is true about the Deployment Immediacy for VMM domains associated to EPGs?

APIC EPG Resolution Immediacy is set to “Immediate” Which statement is true about the Deployment Immediacy for VMM domains associated to EPGs?A . The “Immediate” and “On demand” options require a port group to be created on the VDC . If “On demand” is selected, the policy is programmed in...

December 22, 2020 No Comments READ MORE +

An engineer is configuring VNTag between a virtualized server and a Cisco Nexus 5500 Series switch

DRAG DROP An engineer is configuring VNTag between a virtualized server and a Cisco Nexus 5500 Series switch. Drag and drop the configuration steps from the into the correct order on the right. View AnswerAnswer: Explanation: install the virtualization feature set Enable the virtualization feature set Configure the port profile...

December 22, 2020 No Comments READ MORE +

When the default firmware package is set a new version, which type of policy determines the timing of server reboots during the firmware upgrade?

When the default firmware package is set a new version, which type of policy determines the timing of server reboots during the firmware upgrade?A . maintenanceB . local diskC . BIOSD . diagnosticsView AnswerAnswer: A

December 21, 2020 No Comments READ MORE +

In an FCoE environment, for which two sets of data must an interface that implements the PAUSE mechanism always provision sufficient ingress buffer? (Choose two)

In an FCoE environment, for which two sets of data must an interface that implements the PAUSE mechanism always provision sufficient ingress buffer? (Choose two)A . frames that were sent with high creditB . frames that were processed and transmitted by the transmitter before the PAUSE frame left the senderC...

December 20, 2020 No Comments READ MORE +

Which two roles must be assigned to a user to achieve this goal?

An engineer needs to create a new user in the local user database on Cisco UCS Fabric Interconnect. The user needs permissions to change the following configuration inside UCS Manager version 3.1: vNIC and vHBA profiles Fan speed and power redundancy profile of UCS Manager Which two roles must be...

December 20, 2020 No Comments READ MORE +

Which configuration implements static ingress replication?

Which configuration implements static ingress replication?A . Interface nve 1 member vni 3719035 ingress-replication protocol static peer-ip 10.0.0.4B . Interface nve 1 member vni 3719035 ingress-replication protocol bgpC . Interface nve 1 member vai 3719035 peer vtep 10.0.0.4D . Interface nve 1 member vni 3719035 peer vtep 10.0.0.4 ingress-replication protocol...

December 19, 2020 No Comments READ MORE +

Which cloud model meets this requirement?

A customer has a requirement to deploy a cloud service and needs to have full control over the underlying OS, data and application. Which cloud model meets this requirement?A . PaaSB . MaaSC . IaaSD . SaaSView AnswerAnswer: C

December 19, 2020 No Comments READ MORE +

What are two capabilities of the Cisco Network Assurance Engine? (Choose two.)

What are two capabilities of the Cisco Network Assurance Engine? (Choose two.) A. It verifies the speed of network packet flows by using telemetry. B. It predicts the network load on a data center. C. It validates that devices comply with network security policies. D. It ensures that network performance...

December 19, 2020 No Comments READ MORE +