Download CCIE Data Center Written Exam.pass4sure.400-151.2020-01-24.1e.207q.vcex


Download Exam

File Info

Exam CCIE Data Center Written Exam
Number 400-151
File Name CCIE Data Center Written Exam.pass4sure.400-151.2020-01-24.1e.207q.vcex
Size 12.06 Mb
Posted January 24, 2020
Downloads 28



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%


 
 



Demo Questions

Question 1
Which two statements about VXLAN are true? (Choose two.)

  • A: VXLAN uses a UDP destination port of 4987.
  • B: A VTEP is a virtual or physical device that maps end devices to VXLAN segments.
  • C: Devices that terminate VXLAN tunnels are known as VTEPs.
  • D: VXLAN adds an additional 32 bytes worth of headers.



Question 2
Which two security features are supported by NX-API (Choose two.)

  • A: NX-API support certificate-based authentication.
  • B: Users must have appropriate accounts to access the device through NX-API.
  • C: All communication to the device is encrypted when you use HTTPS.
  • D: All communication to the device is encrypted when you use VPN.



Question 3
Which three guidelines and limitations of policy-based routing are true? (Choose three.)

  • A: A match command can refer to more than one ACL in a route map for policy-based routing.
  • B: Setting a tunnel interface or an IP address via a tunnel interface as a next hop in a police-based routing policy is not supported.
  • C: The same route map can be shared among different interfaces for policy-based routing as long as interfaces belong to the same VRF instance.
  • D: An ACL used in a policy-based routing route map cannot include a deny statement.
  • E: A policy-based routing route map can have multiple match or set statements per route-map statement.
  • F: Policy-based routing and WCCPv2 are not supported on the same interface if bank chaining is disabled.



Question 4
Which three options are common PTP device types? (Choose three.)

  • A: network clock
  • B: sundials
  • C: boundary clock
  • D: transparent clock
  • E: ordinary clock
  • F: crystal clock



Question 5
Which three main functions are provided by OTV to achieve failure isolation? (Choose three.)

  • A: optimal outbound routing
  • B: unknown Unicast traffic suppression
  • C: ARP optimization
  • D: use of multiple OTV overlays
  • E: Spanning Tree isolation
  • F: unicast policy control



Question 6
  

Refer to the exhibit. If you inspect a VXLAN packet at point 2, which two options about the outer fields in the VXLAN header are two? (Choose two.)

  • A: Outer S-IP = IP-1 ; Outer D-IP = IP-2.
  • B: Outer S-IP = IP-A : Outer D-IP = IP-B.
  • C: Outer S-MAC = MAC-1 ; Outer D-MAC= MAC-4.
  • D: Outer S-MAC = NAC-A ; Outer D-MAC = MAC-B.
  • E: Outer S-IP = IP-1 ; Outer D-IP = IP-4.
  • F: Outer S-MAC = MAC-1 ; Outer D-MAC = MAC-2



Question 7
Which three statements about ASM and SSM are correct? (Choose three.)

  • A: By default, the SSM group range for PIM is 232.0.0.0/8 and for PIM6 is FF3x/96.
  • B: PIM ASM is not fully supported on a vPC.
  • C: In ASM mode, only the last-hop router switches from the shared tree to theSPT.
  • D: ASM mode requires that you configure an RP.
  • E: If you want to use the default SSM group range, you must configure the SSM group range.



Question 8
  

Refer to the exhibit. Within an ACI fabric, a routing protocol is needed to assist with route redistribution between the outside networks and the internal fabric. Which routing protocol is needed to run in the fabric at location 1 to allow the VM access to the networks advertised by the external Layer 3 network.

  • A: iBGP
  • B: eBGP
  • C: IS-IS
  • D: MP-BGP
  • E: OSPF



Question 9
Which two statements about CFS are true? (Choose two.)

  • A: CFS distributes the local NTP configuration to masteronly which then forwards it to all devices in network.
  • B: After enabling CFS, a network-wide lock is applied to NTP whenever an NTP configuration is started and released once after the change has been committed or discarded.
  • C: If CFS is used to distribute NTP, all devices in the network must have the different VRFs configured then as used for NTP.
  • D: You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS devices across the network.
  • E: CFS requires a license to be installed before it can be used to distribute NTP.



Question 10
  

Refer to the exhibit. When specifying subnets under a bridge domain for a given tenant, the user can specify the scope of a subnet. Which definition of the public subnet scope is true?

  • A: It indicates that this subnet is advertised to the external router by the border leaf.
  • B: It indicates that this subnet is advertised to the border leaf in ACI fabric.
  • C: It indicates that it must be leaked to one or more private networks within ACI fabric.
  • D: It indicates that this subnet is advertised to public Internet and must be protected by a firewall.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset