Download CCIE Data Center Written Exam.test-king.400-151.2018-08-14.1e.132q.vcex

Download Dump

File Info

Exam CCIE Data Center Written Exam
Number 400-151
File Name CCIE Data Center Written Exam.test-king.400-151.2018-08-14.1e.132q.vcex
Size 9.63 Mb
Posted September 06, 2018
Downloaded 3



How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase
Coupon: EXAMFILESCOM

Coupon: EXAMFILESCOM
With discount: 20%





Demo Questions

Question 1
Which three statements about ASM and SSM are correct? (Choose three.)

  • A: By default, the SSM group range for PIM is 232.0.0.0/8 and for PIM6 is FF3x/96.
  • B: PIM ASM is not fully supported on a vPC.
  • C: In ASM mode, only the last-hop router switches from the shared tree to theSPT.
  • D: ASM mode requires that you configure an RP.
  • E: If you want to use the default SSM group range, you must configure the SSM group range.



Question 2
  

Refer to the exhibit. Within an ACI fabric, a routing protocol is needed to assist with route redistribution between the outside networks and the internal fabric. Which routing protocol is needed to run in the fabric at location 1 to allow the VM access to the networks advertised by the external Layer 3 network.

  • A: iBGP
  • B: eBGP
  • C: IS-IS
  • D: MP-BGP
  • E: OSPF



Question 3
Which option is achieved by enabling FabricPath?

  • A: decreases the mobility and virtualization
  • B: loop prevention and mitigation without the use of Spanning Three
  • C: Layer 2 multipathing in the FabricPath network
  • D: single control plane only for multicast traffic



Question 4
Which three statements are true about redistribution of routes from L3Outs in an ACI fabric? (Choose three.)

  • A: ACI fabric runs MP-BGP.
  • B: Route control subnets control the exchange of routing information (prefixes) into and out of the fabric (control plane).
  • C: Routes are nor redistributed to leaf switches where the same VRF is present.
  • D: Routes learned from L3Outs on border leaf switches are not redistributed into MP-BGP at the ingress leaf.
  • E: Security import subnets control the forwarding of packets into and out of L3Out connections (data plane).
  • F: The routes are advertised to all external Layer 3 Outside connections.



Question 5
Which two statements about CFS are true? (Choose two.)

  • A: CFS distributes the local NTP configuration to masteronly which then forwards to all devices in network.
  • B: After enabling CFS, a network-wide lock is applied to NTP whenever an NTP configuration is started and released once after the change has been committed or discarded.
  • C: If CFS is used to distribute NTP, all devices in the network must have the different VRFs configured then as used for NTP.
  • D: You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS devices across the network.



Question 6
Which two statements about IP Source Guard are true? (Choose two.)

  • A: IP Source Guard is dependent upon DHCP snooping to build and maintain the IP-MAC address binding table or upon manual maintenance of static IP source entries.
  • B: When you first enable IP Source Guard on an interface, you may experience disruption in IP traffic, until the hosts on the interface receive a new IP address from a DHCP server.
  • C: By default, IP Source Guard is enabled on all interfaces.
  • D: IP Source Guard requires that DHCP snooping is disabled.



Question 7
  

Refer to the exhibit. When specifying subnets under a bridge domain for a given tenant, the user can specify the scope of a subnet. 
Which definition of the public subnet scope is true?

  • A: It indicates that this subnet is advertised to the external router by the border leaf.
  • B: It indicates that this subnet is advertised to the border leaf in ACI fabric.
  • C: It indicates that it must be leaked to one or more private networks within ACI fabric.
  • D: It indicates that this subnet is advertised to public Internet and must be protected by a firewall.



Question 8
Which two statements about policing, queueing, and scheduling are true? (Choose two.)

  • A: The WRED algorithm is reactive approach only to a traffic congestion.
  • B: Policing is the monitoring of data rates for a particular class of traffic. The device can also monitor associated sizes.
  • C: You can apply weighted random early detection to a class of traffic, which allows packets to be dropped based on the CoS field.
  • D: You can schedule traffic by imposing a maximum data rate on a class of traffic, so that excess packets are dropped.



Question 9
Which three PVLAN port modes are supported on Cisco Nexus 9000? (Choose three.)

  • A: FEX port
  • B: port channels
  • C: community host
  • D: isolated host trunk
  • E: isolated host
  • F: virtual port channels



Question 10
After VTEP devices have established BGP neighbor adjacencies with other VTEPs or with Internal BGP route reflectors, which three pieces of information are exchanged through BGP? (Choose three.)

  • A: VTEP address
  • B: VTEP peer list
  • C: VPNv4 prefixes
  • D: router MAC address
  • E: Layer 3 VNI









CONNECT US


ProfExam
PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount..

Get Now!


HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen



HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset