Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
300-610
Free trial
Verified
Question 26
Refer to the exhibit.
Server 1 fails to connect to the storage array over the Storage Area Network (SAN) of the Cisco MDS 9000 Series Switch. The requirements are to redesign the storage network and keep these considerations in mind:
• The traffic from each of the servers must be redundant and isolated.
• The design must tolerate hardware and software failures and upgrades of SAN fabric devices.
Which action must be taken to meet these requirements?
- A: Enable NPV and F-Port-channel on ports that face Server 1 on the Fibre Channel switch to create redundant paths.
- B: Create a SAN port channel that faces the storage device to sustain a link failure.
- C: Add an additional supervisor to the Fibre Channel switch to support nondisruptive upgrades.
- D: Place an additional Fibre Channel switch to create two physically independent storage fabrics.
Question 27
A network architect designs the iSCSI-based storage area network solution. The iSCSI datastore must be designed with high availability, minimal downtime, and no single point of failure. The requirement is to fail over I/O to alternate paths based on SCSI sense codes without reliance on network failures.
Which feature must be deployed to meet these requirements?
- A: hardware-based flow control
- B: port security
- C: iSCSI multipath
- D: NIC teaming
Question 28
A network consultant reviews the requirements for the Storage Area Network (SAN) design. The proposed solution must offer a very efficient port usage and eliminate the need for a separate physical layer of switches and their associated ISLs. The design is not expected to require future expansion.
Which SAN topology must be used to meet these requirements?
- A: core-edge
- B: collapsed-core
- C: core-distribution-access
- D: edge-core-edge
Question 29
A storage administrator receives reports of network delays when database software attempts to access the storage array. The virtual machines that host the database software are installed on different rack servers connected to the Cisco UCS Fabric Interconnect domain. The existing SAN switches are connected to the Fabric Interconnects using two 8 Gb port-channel interfaces to connect the storage array. The storage administrator has decided to deploy iSCSI storage with four 10 Gbps interfaces connected to the Cisco UCS Fabric Interconnects.
Which deployment type resolves the problems with storage contention?
- A: iSCSI storage with Cisco UCS Fabric Interconnect in the virtual port-channel mode
- B: iSCSI storage with Cisco UCS Fabric Interconnect using an appliance port
- C: iSCSI storage appliance on Cisco UCS Fabric Interconnect uplink trunk port
- D: iSCSI storage appliance on Cisco UCS Fabric Interconnect in the storage end-host mode
Question 30
What are two characteristics of VRF-Lite on the Cisco NX-OS platform? (Choose two.)
- A: Layer 3 interfaces can belong to multiple VRFs.
- B: VRF-Lite interfaces can be Layer 2.
- C: Overlapping IP addresses are permitted on different VRFs.
- D: Interfaces that belong to VRFs can be physical or logical.
- E: VRF-Lite interfaces support MPLS.
Question 31
An engineer must implement an iSCSI storage connectivity in the existing Cisco UCS environment. The environment is based on Cisco UCS С-Series rack server, Cisco Nexus 1000V Series Switches, and VMware ESXi hosts. The implementation must meet these requirements:
• Provide multipathing and high availability in the event of a critical path failure.
• Be cost-effective and not require the purchase of new equipment.
Which two components must be selected to meet these requirements? (Choose two.)
- A: software iSCSI adapter
- B: storage binding
- C: uplink pinning
- D: system VLAN
- E: hardware iSCSI NIC
Question 32
A network engineer must create a Fibre Channel fabric QoS design for an existing data center. The solution must provide relative bandwidth guarantees to application traffic, control latency, and prioritize application traffic.
Which mechanism must be deployed to support these requirements?
- A: traffic policing
- B: traffic shaping
- C: traffic remarking
- D: traffic classification
Question 33
A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network devices and servers. The company servers already have been security-hardened and must not have any additional software installed on them. The security policy mandates the use of a secure communication protocol that supports authentication and encryption for managing the servers.
Which two automation tools must be used to meet these requirements? (Choose two.)
- A: Ansible
- B: CFEngine
- C: SaltStack
- D: Chef
- E: Puppet
Question 34
Which two automation requirements are met when Puppet is used? (Choose two.)
- A: Enable clients to pull changes without installing an agent.
- B: Enable clients to pull changes to configuration files.
- C: Enable one-off infrastructure changes to be performed manually.
- D: Immediately push configuration updates to servers.
- E: Provide support for writing new modules in Python.
Question 35
An engineer wants to eliminate the manual process of checking the system hardware and firmware against a specified hardware compatibility tool. The tool must be able to manage an extensive list of devices including Cisco HyperFlex, MDS, and Nexus switches. The tool must manage hardware in multiple data centers so it should be deployed on public cloud infrastructure.
Which tool meets these requirements?
- A: Cisco Tetration
- B: Cisco Data Center Network Manager
- C: Cisco UCS Director
- D: Cisco Intersight
Question 36
A network design must include a solution to run CLI commands remotely on Cisco Nexus 9000 Series Switches. The customer's security policy requires secure login credentials and an encrypted underlying transport. The command output will be processed rising tools that support XML or JSON encoding.
Which two components should be included in the design? (Choose two.)
- A: NX-API
- B: HTTPS
- C: HTTP
- D: Bash shell
- E: SSH
Question 37
Refer to the exhibit.
What must be the default gateway of the servers in EPG Web?
- A: subnet address of BD1
- B: subnet address of L3Out
- C: subnet address of BD2
- D: NAT appliance
Question 38
A company owns a large-scale compute infrastructure that consists of over 1000 servers and virtual machines. The operational complexity continues to grow with additional policies and servers added to the environment. An infrastructure engineer is looking for an automation tool to reduce the operational complexity of configuring complex infrastructure. Because of the strict security requirements, the tool must be agentless, use the secure shell for transport, and be extendable using existing Python modules. Which tool meets these requirements?
- A: Puppet
- B: NSO
- C: Saltstack
- D: Ansible
Question 39
A customer requires a tool to manage Cisco network hardware. The solution must use secure communication using a secure network protocol, support the use of declarative language to manage the state of resources, and periodically pull changes to the controlled nodes. Which tool meets these requirements?
- A: Ansible
- B: SaltStack
- C: Puppet
- D: Nornir
Question 40
An engineer seeks a solution to retrieve routing information from Cisco Nexus switches. The data must be exported to a web application in a JSON or XML data format for monitoring and must be encrypted during transmission. The solution must not require extensive knowledge to support and should be simple to implement.
Which technology accomplishes these goals?
- A: streaming telemetry
- B: Cisco Tetration
- C: NX-API
- D: Python scripts
Question 41
A network engineer is using a Cisco UCS environment connected to a Fibre Channel storage array. The Cisco UCS environment must be connected to an existing SAN network, and several Cisco MDS 9000 Series Switches must be added to increase storage density. The solution must not exhaust the SAN network from the list of available domain IDs after connecting. Also, most of the SAN traffic must be mapped from the Cisco UCS blades to a specific group of the fabric interconnect ports. Which two features must be deployed to meet these requirements? (Choose two.)
- A: dynamic port pinning
- B: end host mode
- C: static PIN grouping
- D: N-Port ID virtualization
- E: priority flow control
Question 42
An ACI deployment must:
• Only use a proxy for border leaf switches.
• Classify incoming traffic on L3OUT.
• Immediately update the endpoint database when the endpoint moves between leaf switches.
Which VRF configuration must be used?
- A: Ingress Policy Control enforcement Egress Policy Control enforcement IP Dataplane Learning enabled
- B: Enforce Subnet Check disabled - IP Dataplane Learning disabled - Ingress Policy Control enforcement
- C: Enforce Subnet Check enabled - IP Dataplane Learning enabled - Egress Policy Control enforcement
- D: Ingress Policy Control enforcement Enforce Subnet Check enabled - IP Dataplane Learning disabled
That’s the end of your free questions
You’ve reached the preview limit for 300-610Consider upgrading to gain full access!
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!