[Free] 2018(Apr) EnsurePass Braindumps Cisco 400-151 Dumps with VCE and PDF 201-210

Ensurepass.com : Ensure you pass the IT Exams
2018 Apr Cisco Official New Released 400-151
100% Free Download! 100% Pass Guaranteed!

CCIE Data Center (v2.0)

Question No: 201 – (Topic 2)

Where is FIP negotiated?

  1. between E Nodes and VF ports

  2. between E Nodes and F Nodes

  3. between VF ports

  4. between VN ports

  5. between VN ports and VF ports and FCFs Answer: E

Question No: 202 – (Topic 2)

Which two statements about end-host mode are true? (Choose two.)

  1. In end-host mode, if a vNIC is hard pinned to an uplink port and this uplink port goes down, the system repms the vMIC, and the vNIC go

  2. End-host mode allows the fabric in interconnect to act as an end host to the network, representing all servers (hosts) connected to it through vNICs.

  3. End-host mode is the default Ethernet switching mode.

  4. In end-host mode, the fabric interconnect runs the 5pann,ng Tree Protocol to avoid loops.

  5. In end-host mode, if a vNIC is hard pinned to an uplink port and this uplink port goes down, the system repins the vNIC but the vNIC remain down until manual intervention.

Answer: B,C

Explanation: Ref: http://www.cisco.com/c/en/us/solutions/collateral/data-center- virtualization/unified-computing/whitepaper_c11-701962.html

Question No: 203 – (Topic 2)

Refer to the exhibit.

Ensurepass 2018 PDF and VCE

How many virtual adapters (vN|C and vHBA. can be added to this host?

A. 130

B. 128

C. 256

D. 258

Answer: C

Question No: 204 – (Topic 2)

Which three options are SDN Southbound protocols? (Choose 3)

  1. Puppet

  2. OVSDB

  3. APl

  4. OpenFlow

  5. VXLAN

  6. PCEP

Answer: B,D,F

Question No: 205 – (Topic 2)

Which description of how to enable DIMM Blacklisting is true?

  1. Configure a memory policy in the equipment gt; policy subtab.

  2. Enable blacklisting in the servers inventory gt; memory subtab.

  3. Configure a memory policy under the services tab.

  4. Enable blacklisting in the servers gt; policy subtab.

Answer: D

Question No: 206 – (Topic 2)

Which two statements about multicast routing are true? (choose two)

  1. You can define RPF routes for multicast when you want multicast data to diverge from the unicast traffic path

  2. Multicast routes are used to directly forward traffic without making RPF checks

  3. You can define RPF routes for multicast on border routers to enable reverse path forwarding to an external network

  4. RPF routes for multicast can be distributed

  5. IPv6 static multicast routes are supported

Answer: A,C

Question No: 207 – (Topic 2)

Where is a typical request in the Cisco UCS XML API placed in the data management engine, and, after the request is confirmed, what is updated?

  1. The request is placed in the transactor queue in FIFO order and the management information tree is updated.

  2. The request is placed in the replicator and persistifier and the store is updated.

  3. The request is placed in the data management engine and the application gateway is updated.

  4. The request is placed in the buffer queue and the commit buffer queue is updated.

Answer: A

Question No: 208 – (Topic 2)

Which two statements about OpenStack are true? (Choose 2)

  1. Horizon is the component that is used for IP address management.

  2. Nova is the compute component that is used to manage and automate the provisioning of compute

    resources.

  3. Keystone is the networking component that is used to create and manage network resources.

  4. Neutron is the networking component that is used to create and manage network resources.

  5. Trove is the GUI web application that is used to control and configure different 0penStack components.

Answer: D,E

Question No: 209 – (Topic 2)

Which three PVLAN port modes are supported on Cisco Nexus 9000? (Choose three.)

  1. port channels

  2. isolated host trunk

  3. FEX port

  4. virtual port channels

  5. isolated host

  6. community host

Answer: B,E,F

Question No: 210 – (Topic 2)

On Cisco Nexus 1000v Switch, you can allow the VSM and VEM to communicate over IP for control and packet traffic.Before you create a port profile for Layer 3 control, which two statements must be verified? (Choose two)

  1. Only one port profile can be configured with the capability Layer 3 control command.

  2. All VEMs belong to the same Layer 2 domain.

  3. The transport mode for the VSM domain should be configured as Layer 3.

  4. The port profile must be a trunk port profile.

  5. Different hosts should belong to the same VLANs for Layer 3 control. Answer: A,C

100% Ensurepass Free Download!
Download Free Demo:400-151 Demo PDF
100% Ensurepass Free Guaranteed!
Download 2018 EnsurePass 400-151 Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.