Download CCIE Data Center Written Exam.pass4sures.400-151.2019-04-18.1e.180q.vcex

Download Dump

File Info

Exam CCIE Data Center Written Exam
Number 400-151
File Name CCIE Data Center Written Exam.pass4sures.400-151.2019-04-18.1e.180q.vcex
Size 7.78 Mb
Posted April 18, 2019
Downloads 13



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
Which two security features are supported by NX-API (Choose two.)

  • A: NX-API support certificate-based authentication.
  • B: Users must have appropriate accounts to access the device through NX-API.
  • C: All communication to the device is encrypted when you use HTTPS.
  • D: All communication to the device is encrypted when you use VPN.



Question 2
Which statement about VTP bombing is true?

  • A: It occurs because of configuration mismatch on VTPv3 switches. This problem can be avoided using a confirmation management tool.
  • B: It occurs when switches with different VTP versions are connected together. This situation may occur when a new switch is plugged into a stable VTP domain. The MAC address table of the new switch overrides the MAC address table of stable switches causing interruption of service.
  • C: It occurs when a client connects to a switch and launches a distributed denial of service attack against the VTP domain. This attack is possible only ifthe client knows the VTP password.
  • D: It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier stable database is overwritten.



Question 3
Which two options are functions of the 6LoWPAN header? (Choose two.)

  • A: packet fragmentation and reassembly
  • B: limit the lifespan of a packet (TTL)
  • C: IPv6 header compression
  • D: cyclic redundancy check
  • E: Layer 2 encryption



Question 4
Which three options are benefits of the vPC peer switch feature? (Choose three.)

  • A: After the peer link comes up, it performs an ARP bulk sync over CFSoE to the peer switch
  • B: It improves convergence forLayer 3 flows.
  • C: It allows a pair of vPC peer devices to appear as a single STP root in the Layer 2.
  • D: It simplifies STP configuration by configuring both vPC with the same STP priority.
  • E: It eliminates the recommendation to pin the STP root to the vPCprimary switch.



Question 5
Which two statements about IP-directed broadcast are true? (Choose two.)

  • A: The destination address in the IP header of the packet is rewritten to the configured IP broadcast address for the subnet, and the packet is sent as a link-layer broadcast.
  • B: An IP-directed broadcast is an IP packet whose destination address is a valid broadcast address, and it originates from a node that is also part of the same subnet.
  • C: A switch that is not directly connectedto its destination subnet forwards an IP-directed broadcast in the same way it forwards unicast IP packets destined to a host on that subnet.
  • D: All switches in the network forward an IP-directed broadcast in the same way they forward multicast IP packets.



Question 6
Which statement about glean throttling in Cisco NX-OS is true?

  • A: The traffic shaping feature in Cisco NX-OS to avoid bottle necks in the network.
  • B: Cisco NX-OS supports a rate-limiting feature to manages the access bandwidth policy for a network by ensuring that traffic falling within specified rate parameters is sent, while dropping packets that exceed the acceptable amount of traffic or sending them a different priority.
  • C: When forwarding an incoming IP packet in a line card, if the Address Resolution Protocol request for the next hop is not resolved, the line card forwards the packets to the supervisor. The supervisor resolves the MAC address for the next hop and programs the hardware.
  • D: The traffic policing feature manages the maximum rate of traffic through a token bucket algorithm. The token bucket algorithm can use the user-configured values to determine the maximum rate of traffic allowed on an interface at a given moment in time.



Question 7
Which two guidelines apply to private VLAN configuration when you are running FabricPath (Choose two.)

  • A: On the F-Series modules, user-configured static MAC addresses are programmed on all forwarding engines that have ports in that VLAN.
  • B: The system does support hierarchical static MAC addresses.
  • C: FabricPath ports can be put into a private VLAN.
  • D: All VLANs in a private VLAN must be in the same VLAN mode; either CE or FabricPath.



Question 8
Which three statements are true about redistribution of routes from L3Outs in an ACI fabric? (Choose three.)

  • A: ACI fabric runs MP-BGP.
  • B: Route control subnets control the exchange of routing information (prefixes) into and out of the fabric (control plane).
  • C: Routes are nor redistributed to leaf switches where the same VRF is present.
  • D: Routes learned from L3Outs on border leaf switches are not redistributed into MP-BGP at the ingress leaf.
  • E: Security import subnets control the forwarding of packets into and out of L3Out connections (data plane).
  • F: The routes are advertised to all external Layer 3 Outside connections.



Question 9
Which two statements about CFS are true? (Choose two.)

  • A: CFS distributes the local NTP configuration to masteronly which then forwards to all devices in network.
  • B: After enabling CFS, a network-wide lock is applied to NTP whenever an NTP configuration is started and released once after the change has been committed or discarded.
  • C: If CFS is used to distribute NTP, all devices in the network must have the different VRFs configured then as used for NTP.
  • D: You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS devices across the network.
  • E: CFS requires a license to be installed before it can be used to distribute NTP.



Question 10
Which three limitations or requirements do MP-BGP-based EVPN addresses have compared to the initial IETF VXLAN standard (RFC 7348)? (Choose three.)

  • A: requirement to disable multicast for underlay forwarding
  • B: network flooding through protocol-based host MAC/IP route distribution and ARP suppression on the local VTEPs
  • C: active-passive multihoming at Layer 2
  • D: scalability limitations due to data-driven flood-and-learn behavior
  • E: control-plane learning of end-host Layer 2 and Layer 3 reachability information, which provides integrated bridging and routing in VXLAN overlay networks.









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset