A company must introduce a scalable network automation tool to deploy, configure, and manage thousands of network device and service. The company servers already have been security-hardened and must not have any additional software installed on team. The security policy mandates the use of a secure communication protocol that support authentication and encryption for managing the servers. Which two automation tools must be used to meet these requirements? (Choose two.)
An engineer is implementing management access to a Cisco Nexus platform. The customer requires a solution that provides isolation between the data and control planes. In addition to management that uses encryption and authentication. The customer will manage the device using both IPv4 and IPv6. Which two components should be used to meet these requirements (Choose two.)
A customer is implementing a business continuity solution for the current data centers The new location must mitigate the impact of a disaster in any existing data centers by providing an acceptable level of service The solution must support
•fully segregated Layer 2 and 3 fault domains
•low or no human intervention for service restoration
•medium to high RPCVRTO for a subset of applications
•asynchronous storage replication for application data
Which disaster recovery solution must the customer select to meet these requirements?
An engineer must design a Cisco HyperFlex solution to support a virtualized environment in a single data center location. The design must consider these customer requirements:
a large-scale cluster with eight or more nodes
distributed high-performance file system for virtualized servers
high fault tolerance to multiple node failures
Which action meets these objectives?
An engineer seeks a solution to retrieve routing information from Cisco Nexus switches. The data must be exported to a web application in a JSON or XML data format for monitoring and must be encrypted during transmission. The solution must not require extensive knowledge to support and should be simple to implement.
Which technology accomplishes these goals?
Drag and drop the data center technologies from the left onto the correct descriptions on the right. Not all technologies are used.
A network consultant evaluates the Ethernet Adapter Policy configuration to be applied to the Cisco UCS blade servers. The policy must minimize latency and increase throughput for sensitive applications. The solution must increase the CPU data cache hit rate to meet these requirements Which policy is required?
Refer to the exhibit. A Cisco engineer is configuring a PBR in a Cisco ACI data center scenario and plans to insert a transparent firewall. The APIC release is 4.1. the Cisco ACI fabric is configured to be the gateway for the servers and for the PBR node, and the Layer 4/ Layer 7 devices are deployed as Layer 1/ Layer 2 mode in the physical domain. Layer 1/Layer 2 PBR node interfaces arc also configured to be in a bridge domain and not in an L30ut. What is required for the consumer and provider connectors of the Layer 1/Layer 2 device for this scenario to work?
Which technology enables Layer 2 extension between remote data center sites?
An engineer must choose the World Wide Port Name for the Cisco UCS Fibre Channel virtual host bus adapter.
Which identifier must be used?
PDF + Testing Engine
|
---|
$70 |
Testing Engine
|
---|
$54 |
PDF (Q&A)
|
---|
$46 |
Cisco Free Exams |
---|
![]() |