To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.
The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Some new sample questions:
Question:
Which programming model is vendor-agnostic and combines operational and configuration data in the same container?
A. OpenConfig
B. IETF
C. open YANG
D. native YANG
Question:
Refer to the exhibit. A Cisco engineer is configuring a FlexPod data center for SAP with Cisco ACI, Cisco UCS Manager 4.0. and Net AppAFFA-Series. All systems and fabric links feature redundancy and provide end-to-end high availability. After the engineer sets the needed VLANs on the NetApp controller ports and adds them to the data broadcast domain, the engineer must make the storage disks visible for the UCS hosts Which action must be taken on the UCS to accomplish this task?
A. Configure ION pools for ISCSI boot.
B. Create aggregates in ONTAP.
C. Provide a storage virtual machine.
D. Enable HTTPS access on the servers.
Question:
A data center with over 4000 VLANs must be stretched lo a disaster recovery site. The solution must support the migration of virtual machines to a disaster recovery site. To support the scalability of the solution, the internal fabric of the main site must be from the DCI network. The connecting network infrastructure uses a 10 Gbps link with PIM ASM supported, which will be replaced with a different overlay in the next 12 months. The solution must support head-end replication for broadcast, unknown unicast, and multicast traffic. Which solution must be used to meet these requirements?
A. OTV
B. LISP
C. MPLS over GRE
D. VXLAN Multi-Site
Question:
Refer to the exhibit During a synchronization of port rotes, a device receives a proposal message on one of its ports that is selected as the new root port. The logs show that Rapid PVST+forced all other ports to synchronize with the new loot information. The engineer analyzes the port stales and concludes that the device is synchronized with superior root information received on the root port, and all other ports are synchronized. What happens to a designated port that is in the forwarding state and is not configured as an edge port, if Rapid PVST+ forces it to synchronize with new root information?
A. It does not receive BPDUs for transmission.
B. IT immediately replies with its own information.
C. It discards frames switched from another port.
D. It transitions to the Mocking state
…………