A. Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
B. DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
C. You can archive a maximum of 50 configuration versions per managed device.
D. Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
E. Device-running configuration will be archived only if it differs from the last archived version.
您可能感興趣的試卷
你可能感興趣的試題
Nexus# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Nexus(config)# interface Loopback10
% Permission denied Nexus(config)# ?
no Negate a command or set its defaults
username Configure user information.
end Go to exec mode
exit Exit from command interpreter
What is the reason why this user is not able to enter configuration commands?()
A. The user did not enter enable prior to going into configuration mode.
B. The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.
C. The user RBAC role is set to network-operator.
D. The user failed authentication and user access defaulted to read-only mode.
E. The AAA server is currently not responding.
A. Cisco DCNM-LAN server users are local to the Cisco DCNM-LAN server. Creating, changing, and removing Cisco DCNM-LAN server users has no effect on user accounts on managed devices.
B. A Cisco DCNM-LAN server user that has Administrator privileges can push out changes to managed devices even if the Cisco NX-OS role that is used on the discovered device has the network operator role.
C. Cisco DCNM-LAN user roles restrict the ability of users to make changes to Cisco DCNM-LAN server settings. Cisco NX-OS user roles enforce read/write privileges on the discovered devices.
D. Cisco DCNM-LAN allows you to configure unique credentials for each discovered device or use default credentials when you do not configure unique credentials for a device.
E. Cisco DCNM-LAN can use AAA servers to authenticate users. Only TACACS servers are supported.
A. DHCP snooping commands are not available until the feature is enabled with the feature dhcp- snooping command.
B. When you enable the DHCP snooping feature, the switch begins building and maintaining the DHCP snooping binding database.
C. The switch will not validate DHCP messages received or use the DHCP snooping binding database to validate subsequent requests from untrusted hosts until DHCP snooping is enabled globally and for each specific VLAN.
D. Globally disabling DHCP snooping removes all DHCP snooping configuration on the switch.
E. Globally disabling DHCP snooping does not remove any DHCP snooping configuration or the configuration of other features that are dependent upon the DHCP snooping feature.
A. The AED is responsible for sending all unicast traffic in a site, while either node in a site can transmit multicast and broadcast.
B. The AED is responsible for load balancing all traffic for all VLANs across the transport network.
C. The AED is responsible for handling all unicast, broadcast, and multicast traffic for a given VLAN within a site.
D. The AED is responsible for MAC address dispute contention for a given VLAN.
A. The verify command will validate commands entered for syntax errors.
B. The save command will save the commands entered to the startup configuration.
C. The network administrator can perform a dry-run ACL configuration by verifying the configuration against the hardware and software resources available before applying it.
D. Configuration sessions can be saved and resumed at any time, even after upgrading NX-OS Software on the switch with ISSU.
E. Configuration sessions are global for all VDCs on the Nexus 7000.
A. Improves convergence of the multicast network due to enhanced RPF checks
B. Simplifies the number of control plane protocols over other RP redundancy methods
C. Eliminates the use of Protocol Independent Multicast (PIM) in the topology
D. Increases the administrative distances in Multicast Source Discovery Protocol (MSDP) configuration
2012 Feb 23 23:00:08.676710 pim: [16132] (default-base) Received unauthenticated hello- message from 10.1.1.2 on Ethernet1/18, message discarded 2012 Feb 23 23:00:12.528763 pim: [16132] (default-base) Send Hello with AH on Ethernet1/18 from 10.1.1.1, holdtimE. 105 secs,dr-priority:1
You are troubleshooting a PIM neighbor adjacency that is not coming up. You issued the command show ip pim neighbor e1/18 and confirmed there is no PIM neighbor on the interface. What is the problem based on the debug output?()
A. The peer router 10.1.1.2 has PIM disabled on its interface connecting to Ethernet1/18.
B. The peer router 10.1.1.2 has the wrong PIM password configured on its interface connecting to Ethernet1/18.
C. The local router 10.1.1.1 has the wrong PIM password configured on Ethernet1/18.
D. The peer router 10.1.1.2 does not have PIM hello authentication enabled on its interface connecting to Ethernet1/18.
E. The local router 10.1.1.1 does not have PIM hello authentication enabled for Ethernet1/18.
A. The supervisor module enforces CoPP before out-of-policy traffic reaches the CPU
B. The fabric modules enforce CoPP in the fabric before out-of-policy traffic reaches the CPU
C. The linecards enforce CoPP locally before out-of-policy traffic reaches the CPU
D. The egress virtual output queue enforces CoPP locally before out-of-policy traffic reaches the CPU
A. on all ingress interfaces; to ensure maximum throughput on a per-egress, per-CoS basis
B. on all ingress interfaces; to provide independent congestion management and 16 queues
C. on all egress interfaces; so that a congested egress port does not affect traffic directed to other egress ports
D. on all egress interfaces; to prevent head-of-line blocking by utilizing multiple virtual output queues
E. on all egress interfaces; to be able to use EEE 802.1p CoS
A. VRRP does not work with vPC due to industry standard requirements
B. VRRP works with vPC in traditional active/standby modes
C. VRRP works with vPC in an active/active mode
D. VRRP work with vPC as long as vPC peer-gateway is configured to address non-standard replies to the physical MAC address
最新試題
On a Cisco Unified Computing System (UCS), which two statements regarding Ethanalyzer are true?()
Which statement is true regarding Backup tasks in Cisco UCS?()
What would be the cause for the following fault in UCS Manager?() "ether VIF x / xxx down, reason: ENM source pinning failed"
Where are SAN Port Channel is created in UCS Manager?()
Refer to the exhibit. According to the equipment tab in Cisco UCS Manager, which is true?()
Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()
An administrator creates a vNIC and assigns it to Fabric A with the fabric failover feature enabled. Which statement is true?()
Given the following output: san-port-channel 12 is up Hardware is Fibre Channel Port WWN is 24:0c:00:0d:ec:d3:5c:00 Admin port mode is NP, trunk mode is on Port mode is NP Port vsan is 1 Speed is 8 Gbps Member[1] : fc2/3 Member[2] : fc2/4 What does "Speed is 8 Gbps" indicate?()
A Cisco Application Control Engine Appliance (ACE) non-admin context does not support "sticky" configuration. What is the reason for this issue?()
Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()