Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 101-110

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.101

Which protocol data unit is associated with the link layer of the TCP/IP model?

  1. frame

  2. packet

  3. segment

  4. datagram

Correct Answer: A

Question No.102

Which two hosts are part of subnet 172.16.160.0/20? (Choose two.)

A.

172.16.168.0

B.

172.16.176.1

C.

172.16.160.255

D.

172.16.160.0

E.

172.16.176.255

Correct Answer: AC

Question No.103

Which statement describes the purpose of the MAC address forwarding table of a switch?

  1. The switch consults the forwarding table to determine the best route to a destination.

  2. The switch consults the forwarding table to determine the output port.

  3. The switch consults the forwarding table to determine if the packet is routable.

  4. The switch consults the forwarding table to determine if access control permits the packet.

Correct Answer: B

Question No.104

A SAN administrator recently added a new zone to the VSAN 2 zone set named zone set2, but the server is still unable to access the shared storage. Which command will resolve this issue?

  1. zone copy active-zoneset ful-zoneset

  2. zoneset activate zoneset2

  3. zone default-zone permit vsan 2

  4. copy running-config startup-config

Correct Answer: C

Question No.105

What native Fibre Channel technology facilitates connecting multiple Fibre devices behind a single FC address?

  1. Fiber Channel over Ethernet

  2. N-Port Virtualization

  3. Fibre Channel Arbitrated Loop

  4. N-Port Identification Virtualization

Correct Answer: B

Question No.106

Which protocol is used to encapsulate Fibre Channel frames, enabling them to be transmitted over Ethernet networks?

  1. FCoE

  2. DCB

  3. SCSI

  4. Ethernet SAN

Correct Answer: A

Question No.107

The nWWN is assigned to which San fabric component?

  1. a Fibre Channel adapter

  2. a disk

  3. an SFP module

  4. a Fibre Channel interface

Correct Answer: D

Question No.108

When command set will create an access control 1st on a Cisco Nexus switch to permit only unencrypted Web traffic from any source to destination host 10.10.1.110?

  1. N5K-A(config)#access-list 101 permit tcp any host 10.10.1.110 eq 80

  2. N5K-A(config)# Ip access-list 101

    N5K-A(config-acl)# permit tcp any host 10.10.1.110 eq 80 N5K-A(config-acl)# permit Ip any any

  3. N5K-A(config)#Ip access-list 101

    N5K-A(config-acl)# permit tcp any host 10.10.110 eq 80

  4. N5K-A(config)#Ip access-list 101 permit tcp any host 10.10.1.100 eq 80 N5K-A(config)#Ip access-list 101 deny ip any any

Correct Answer: C

Question No.109

How many bits are in an IPv4 address?

A.

32

B.

24

C.

8

D.

4

Correct Answer: A

Question No.110

A network administrator is tasked with creating a switched virtual interface for VLAN 100 on a new Cisco Nexus switch. Which two commands does the network administrator need? (Choose two.)

  1. feature interface-vlan

  2. interface vlan 100

  3. feature private-vlan

  4. interface 100

  5. interface mgmt 100

Correct Answer: AB

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 111-120

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.111

When connecting a switch port to a virtualization host requiring 802.1q VLAN tagging, which spanning-tree port type should be configured on the switch?

  1. normal

  2. edge

  3. edge trunk

  4. PortFast

  5. trunk

Correct Answer: C

Question No.112

Which two features must be licensed on a Cisco Nexus 5548UP Switch? (Choose two.)

  1. Virtual Port Channel

  2. Fibre Channel

  3. FabricPath

  4. iSCSI

Correct Answer: BC

Question No.113

Which two are Fibre Channel topologies? (Choose two.)

  1. spine and leaf topology

  2. port-to-port

  3. port-to-multipoint

  4. star topology

  5. arbirated loop

Correct Answer: BD

Question No.114

What are two attributes of a VLAN? (Choose two.)

  1. A VLAN defines a collision domain.

  2. A VLAN defines a broadcast domain.

  3. Broadcasts are flooded to all VLANs.

  4. Collisions are flooded to all VLANs.

  5. A Layer 3 device is required to route packets between VLANs.

  6. A Layer 2 device is required to route packets between VLANs.

Correct Answer: BE

Explanation:

quot;In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN.quot;

quot;A router (Layer 3 device) serves as the backbone for network traffic going across different VLANs.quot;

http://en.wikipedia.org/wiki/Virtual_LAN

Question No.115

7K-3 and 7k-4 have the following configuration. Spanning-tree mst 1 priority 24576

Spanning-tree mst configuration name DCICN

revision 2

instance 1 vlan 100-150

Which of the following statements is true about the network?

  1. 7K-3 is the mst root for VLANs 100-150

  2. 7k-4 is the mst root for VLANs 100-150

  3. Both 7k-3 and 7k-4 are the root for VLANs 100-150

  4. MST is not enabled on 7k-3 and 7k-4

Correct Answer: D

Question No.116

What is the order of the OSI stack starting at Layer 1 and ending at Layer 7?

  1. Application, Presentation, Session, Transport, Network, Data Link, Physical

  2. Application, Presentation, Transport, Data Link, Session, Physical, Network

  3. Physical, Network, Transport, Data Link, Session, Application, Presentation

  4. Physical, Data Link, Network, Transport, Session, Presentation, Application

  5. Presentation, Application, Data Link, Session, Network, Transport, Physical

Correct Answer: D

Question No.117

Which situation will cause a switch to flood traffic out all of the ports on the switch?

  1. The switch receives a destination MAC address of 0000.0000.0000

  2. The switch receives a destination MAC address of ffff.ffff.ffff

  3. The switch receives a source MAC address of 0000.0000.0000

  4. The switch#39;s TCAM reaches the MAC address limit.

  5. The switch was configured in cut-through mode.

Correct Answer: B

Question No.118

What are two features of a bridge? (Choose two.)

  1. Reliable transmission

  2. Operate at OSI Layer 2

  3. Operate at OSI Layer 3

  4. Create multiple broadcast domains

  5. Create multiple collision domains

  6. Flood input packets to all ports

  7. Drop IP packets with invalid destination ports

Correct Answer: BE

Explanation:

quot;- a bridge is a two interfaces device that creates 2 collision domains, since it forwards the traffic it receives from one interface only to the interface where the destination layer 2 device (based on his mac address) is connected to. A bridge is considered as an quot;intelligent hubquot; since it reads the destination mac address in order to forward the traffic only to the interface where it is connectedquot;

https://learningnetwork.cisco.com/thread/1734

Question No.119

Which layer of the OSI model is associated with the reliable transmission of datagrams?

  1. Datagram

  2. Routing

  3. Network

  4. Data link

  5. Transport

  6. Transmission

  7. Session

Correct Answer: E

Explanation:

http://en.wikipedia.org/wiki/Transport_layer

Question No.120

Which block storage protocol can be used over unlimited distance?

  1. SMB

  2. iSCSI

  3. Fibre Channel

  4. FCoE

Correct Answer: B

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.41

Refer to the exhibit. What two commands will allow the Nexus 5000 switch to continue to boot? (Choose two.)

image

A. boot n5000-uk9-kickstart.5.2.1.N1.4.bin B. load n5000-uk9.5.2.1.N1.4.bin

  1. copy kickstart-latest n5000-uk9-kickstart.5.2.1.N1.4.bin startup

  2. copy system-latest n5000-uk9.5.2.1.N1.4.bin

  3. boot n5000-uk9.5.2.1.N1.4.bin admin-password Cisco123

  4. load n5000-uk9-kickstart.5.2.1.N1.4.bin

Correct Answer: AB

Question No.42

Which communication type uses a one-to-many model to replicate packets that are delivered to many interested recipients?

  1. unknown unicast

  2. broadcast

  3. unicast

  4. multicast

Correct Answer: D

Question No.43

What two technologies can be used to connect to storage arrays on a converged Ethernet IP network? (Choose two.)

  1. FCoE

  2. Fiber Channel

  3. iSCSI

  4. InfinBand

  5. FabricPath

Correct Answer: AC

Question No.44

Which description of the AAA accounting feature is true?

  1. It regulates which options a user can access on a switch.

  2. It maintains a log of every management session used to access a switch.

  3. It verifies the identity of a user who is accessing a switch.

  4. It assembles a set of attributes that describe what a user is authorized to perform.

Correct Answer: B

Question No.45

When the auto-MDIX is disabled, which two network configuration require a crossover cable?

  1. hub-to-switch

  2. switch-to-workstation

  3. router-to-workstation

  4. hub-to-router

  5. Switch-to-router

Correct Answer: E

Question No.46

What action does a switch take if the destination MAC address is unknown?

  1. Discard frame

  2. Send ICMP unreachable message to source

  3. Flood packet on all ports

  4. Compare destination IP address against an ACL to determine if it is permitted

  5. Send gratuitous ARP on all ports and wait for reply before forwarding

Correct Answer: C

Explanation:

quot;What happens though when the switch receives a frame with a destination MAC address that is not included in the table? In that case the switch will just broadcast/flood the frame with the unknown destination address to all of its ports (apart from the port where the frame came from). This process is called unknown unicast flooding. quot;

http://telconotes.wordpress.com/2013/03/09/how-a-switch-works/

Question No.47

What are three reasons that switches supersede bridges? (Choose three.)

  1. Smaller frame buffers decrease latency.

  2. Forward, filter, or flood frames.

  3. Multiple simultaneous communications between ports.

  4. Larger inspection engine allows for higher throughput.

  5. Switches have many ports.

    Correct Answer: BCE

    Explanation:

    http://docwiki.cisco.com/wiki/Bridging_and_Switching_Basics

    Question No.48

    Which description of a FLOGI database I?

    1. It displays the status of the various VSANs in the fabric.

    2. it indicates the devices that connect directly to the switch.

    3. It shows the switch of the zones on the Local switch.

    4. It travels VSAN s in the network.

Correct Answer: B

Question No.49

A customer wants to connect to their SAN via Fibre Channel. Which two devices can be used to provide connectivity? (Choose two.)

  1. Cisco Nexus 5548UP Switch

  2. Cisco MDS 9148 Multilayer Fabric Switch

  3. Cisco Nexus 2248TP GE Fabric Extender

  4. Cisco Catalyst 6509 Switch

  5. Cisco Nexus 7010 Switch

Correct Answer: AB

Question No.50

Which address and subnet combination is valid for a host assignment?

A.

172.23.175.210/15

B.

10.100.74.127/25

C.

192.168.73.223/29

D.

10.230.33.15/28

Correct Answer: A

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 51-60

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.51

Which statement describes the uses of zones in a VSAN?

  1. Zones are configured at the fabric core.

  2. An HBA or storage device can only belong to zone.

  3. Zones limit unicast, multicast, and broadcast traffic.

  4. Zones are a group of sports within a single VSAN.

Correct Answer: C

Question No.52

Which type of media uses electromagnetic waves that are generated by lasers, is often used in campus backbones, and is capable of transmitting to a distance of 60 kilometers?

  1. shielded twisted-pair cable

  2. coaxial cable

  3. multimode fiber-optic cable

  4. single-mode fiber-optic cable

Correct Answer: C

Question No.53

Which two options are block-based storage protocols? (Choose two.)

  1. NFS

  2. iSCSI

  3. NAS

  4. FCoE

  5. CIFS

Correct Answer: BD

Question No.54

Which two port types are needed to build out an FCoE pass-through switch in NPV mode while maintaining Fiber Channel packet visibility? (Choose two.)

  1. VN Port

  2. VE Port

  3. VF Port

  4. Edge Port

  5. N Port

Correct Answer: AC

Question No.55

Which three layers of the OSI model are included in the application layer of the TCP/IP model? (Choose three.)

A.

5

B.

6

C.

3

D.

7

E.

4

Correct Answer: ABD

Question No.56

Refer to the exhibit. How does the switch process the Ethernet frame?

image

  1. drop the frame

  2. Forwards the frame to port3

  3. filter the frame

  4. floods the frame

Correct Answer: B

Question No.57

A network engineer is verifying Layer 2 connectivity of a server to a Cisco Nexus switch by checking the Address Resolution table statistics. Which command shows the MAC address, physical interfaced, VLAN and IP address of a server on a Cisco Nexus switch?

  1. show Ip arp interface

  2. show Ip arp

  3. show Ip arp detail

  4. show arp detail

Correct Answer: C

Question No.58

Refer to the exhibit. What is the result when you run the command? datacenter(config)# zoneset activate name ZS vsan 20

  1. All switches in the fabric receive the active zone set.

  2. The zone set is activated on the switch only.

  3. On the reboot, all switches in the fabric receives the active zone set.

  4. The default zone set is activated on all switches in the fabric.

Correct Answer: B

Question No.59

Which device would you select to partition a network into VLANs?

  1. repeater

  2. bridge

  3. switch

  4. router

  5. hub

Correct Answer: C

Question No.60

What is the minimum number of fabric modules that should be installed in the Cisco Ne*js 7000 chassis for N 1 redundancy using Ml-Series line card?

A.

3

B.

4

C.

5

D.

6

Correct Answer: A

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 61-70

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.61

A network uses on pair of Layer 3 switches for core and distribution purposes. Which design is this network using?

  1. collapsed core

  2. collapsed distribution

  3. collapsed Layer 3 core

  4. collapsed Layer 2-3

Correct Answer: A

Question No.62

In HSRP, how do interface determine failure and assign standby and active routers?

  1. by using Cisco Discovery

  2. by using Cisco Spanning Tree protocol

  3. by exchanging BPDUs

  4. by using multicast UDP hello messages

Correct Answer: D

Question No.63

At which layer in the OSI stack does the Hypertext Transfer Protocol operate?

  1. Layer 1

  2. Layer 2

  3. Layer 3

  4. Layer 4

  5. Layer 5

  6. Layer 6

  7. Layer 7

Correct Answer: G

Question No.64

Which OSI reference model layer provides flow control, sequencing, and acknowledgments?

  1. transport

  2. data link

  3. session

  4. presentation

Correct Answer: A

Question No.65

Which two statements about configuring VLANs on the Cisco Nexus 7000 platform are true? (Choose two.)

  1. Software updates are disruptive to VLANs.

  2. VLANs with the same number are unique to their VDC.

  3. VLAN licensing is required for use.

  4. To change VLAN information, the administrator must be at the switch (config) # prompt.

  5. The command copy running-config startup-config will save changes to the VLAN database.

Correct Answer: BE

Question No.66

Which two are functions of the data center access layer? (Choose two)

  1. server connections

  2. VLAN creation

  3. packet filtering

  4. high data transfer rate

  5. high network fault tolerance

Correct Answer: AB

Question No.67

An engineer is configuring a new MDS switch. The switch is powered on, the customer connects to the console, and the initial setup script is started. Which two items can be configured during this setup process?

  1. default port-channel mode

  2. default port VSAN membership

  3. default switch port interface state

  4. default zone mode

  5. default storage VDC

Correct Answer: CD

Question No.68

Which statement is true regarding FIP in FCoE enabled Storage Area Networks?.

  1. It discovers and initializes converged network capable devices connected to an Ethernet cloud.

  2. It uses a dedicated EtherType of 0xFFFF.

  3. It reduces the number of network interface cards required to connect to disparate storage and IP networks.

  4. It reduces the number of cables and switches.

Correct Answer: A

Question No.69

When using HSRP or VRRP, what are the two states of the router interfaces that are ready to take over forwarding for the link, if necessary? (Choose two)

  1. idle

  2. backup

  3. master

  4. Standby

  5. floating

Correct Answer: BD

Question No.70

If a Nexus switch receives a frame and no MAC table entry is found for the destination, what will take place?

  1. The frame will be dropped.

  2. The frame will be flooded.

  3. The sender will be notified.

  4. The destination address will be learned.

Correct Answer: B

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 71-80

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.71

An administrator connected a new server to a Cisco MDS 9222i on Port FCL/20, but did not capture the world wide node name of the host bus adapter Which command returns the needed information?

  1. show wwn status

  2. show Interface fc 1/20

  3. show flogi database

  4. show fcs database

Correct Answer: C

Question No.72

Which process does a Cisco router perform immediately upon powering up?

  1. POST

  2. BIOS

  3. booting from NVRAM

  4. booting from ROM

Correct Answer: A

Question No.73

Which two options are multicast addresses? (Choose two.)

A. FD00::2

B. 192.168.2.2

C. FF05::2

D. 226.10.10.10

E. 240.1.0.1

Correct Answer: CD

Question No.74

Which command set creates an access control list on a Cisco Nexus switch to deny only FTP traffic from any source to destination host 10.10.10.110?

  1. N5K-A(config)# Ip access-list 101

    N5K-A(config-acl)# deny judp any host 10.10.1.110. eq 21 N5K-A(config-acl)# permit ip any any

  2. N5K-A(config)# Ip access-list 101

    N5K-A(config-acl)# deny judp any host 10.10.1.110. eq ftp

  3. N5K-A(config)# deny tcp any host 10.10.1.110. eq ftp N5K-A(config)# access-list 101deny Ip any any

  4. N5K-A(config)# Ip access-list 101

N5K-A(config-acl)# deny tcp any host 10.10.1.110. eq 21 N5K-A(config-acl)# permit Ip any any

Correct Answer: D

Question No.75

What is the command sequence to force a Cisco Nexus 6000 switch to boot using the golden BIOS image?

  1. Press Ctrl-Shift-6 within 30 seconds of when power is supplied to the switch.

  2. Press Ctrl-] within 2 seconds of when power is supplied to the switch.

  3. Press Ctrl-] within 30 seconds of when power is supplied to the switch.

  4. Press Ctrl-Shift-6 within 2 seconds of when power is supplied to the switch.

Correct Answer: D

Question No.76

In fiber Channel networking, the FCID composed of which of the following?

  1. VSANID, area ID, port ID

  2. domain ID, zone ID, port ID

  3. domain ID, area ID, port ID

  4. VSAN ID, zone ID, port ID

Correct Answer: D

Question No.77

Which two network topologies are the most popular in switching? (Choose two.)

  1. Bus

  2. Token passing bus

  3. Star

  4. Extended star

  5. Ring

Correct Answer: CD

Explanation:

http://en.wikipedia.org/wiki/Network_topology

Question No.78

Which two features must be licensed on a Cisco Nexus 7000 Switch? (Choose two.)

  1. Layer 3

  2. Virtual Device Contexts

  3. Virtual Port Channel

  4. Fibre Channel

Correct Answer: AB

Question No.79

Which two statements are true regarding disruptive load balancing and regarding the configuration In this example? (Choose two).

  1. In this scenario disruptive load balancing is disabled.

  2. In this scenario disruptive load balancing is enabled.

  3. Since FCID: 0x1 c0000 is reserved, disruptive load balancing is not configured correctly.

  4. When disruptive load balancing is enabled, NPV redistributes the server interfaces across all available NP uplinks when a new NP uplink becomes operational. To move a server interface from one NP uplink to another NP uplink. NPV forces re initialization of the server interface so that the server performs a new login to the core switch.

Correct Answer: CD

Question No.80

Refer to the exhibit. Regarding the OSI networking model and the updated TCP/IP networking model, which statement about this scenario is true?

image

  1. Model A is TCP/IP, Model B is OSI, Layer C is Transport, Layer D is Internet, and Layer E is Physical.

  2. Model A is OSI, Model B is TCP/IP, Layer C is Session, Layer D is Network, and Layer E is Physical.

  3. Model A is OSI, Model B is TCP/IP, Layer C is Transport, Layer D is Data Link, and Layer E is Physical.

  4. Model A is TCP/IP, Model B is OSI, Layer C is Transport, Layer D is Internet, and Layer E is Network Access.

Correct Answer: C

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.81

Which option includes the two devices that can be connected when a Cisco Fabric Extender Transceiver is used?

  1. Server to Cisco Nexus 5548 Switch

  2. Server to Cisco Nexus 5010 Switch

  3. Cisco Nexus 2000 Series Fabric Extender to Cisco Nexus 5500 Switch

  4. Server to Cisco Nexus 2000 Series Fabric Extender

Correct Answer: C

Question No.82

For which reason would you implement a VSAN?

  1. to overcome the limitations of zoning

  2. to virtualize storage

  3. to segment the physical fabric into multiple logical fabrics

  4. to overcome the limitations of LUN masking

Correct Answer: C

Question No.83

Which statement accurately describes the Single initiator Target zone model?

  1. One initiator node connects to one SAN array.

  2. One initiator HBA port connects to one disk controller

  3. One initiator node connects to one SAN fabric.

  4. One initiator HBA card connects to one disk controller.

Correct Answer: D

Question No.84

At which layer of the OSI Model is TCP traffic encapsulated?

  1. transport

  2. data-link

  3. application

  4. presentation

Correct Answer: A

Question No.85

Which two naming formats are used to identify an iSCSI node? (Choose two.)

  1. EUI

  2. MAC

  3. IPv6

  4. IQN

  5. EHA

Correct Answer: AD

Explanation:

https://pubs.vmware.com/vsphere-4-esx- vcenter/index.jsp?topic=/com.vmware.vsphere.config_iscsi.doc_41/esx_san_config/storage_area

_network/c_iscsi_naming_conventions.html

Question No.86

Refer to the exhibit. Which type of network communication is depicted?

image

  1. 802.3 frame

  2. TCP frame

  3. Ethernet packet

  4. UDP packet

Correct Answer: A

Question No.87

Which two networking devices operate at Layer 1 of the OSI model? (Choose two.)

  1. Repeater

  2. Bridge

  3. Switch

  4. Router

  5. Hub

Correct Answer: AE

Explanation:

It defines the electrical and physical specifications of the data connection. It defines the relationship between a device and a physical transmission medium (e.g. a copper or fiber optical cable). This includes the layout of pins, voltages, line impedance, cable specifications, signal timing, hubs, repeaters, network adapters, host bus adapters (HBA used in storage area networks) and more.

http://en.wikipedia.org/wiki/OSI_model

Question No.88

Which address type is used in IPv4 but is not used in IPv6?

  1. multicast

  2. broadcast

  3. anycast

  4. unicast

Correct Answer: B

Question No.89

What describes how the 802.1Q protocol lactates the transmission of multiple Layer 2 networks on a single link?

  1. adds 802.1Q tag information between the source MAC address and the Ether Type/Length fields

  2. encapsulates the frame inside an 802.1Q tunnel

  3. adds 802.1Q tag information between the preamble and the destination MAC address

  4. encapsulates the packet inside an 802.1Q tunnel

  5. transparently directs packets based on 802.1Q tags inside the header

Correct Answer: A

Explanation:

EEE 802.1Q uses an internal tagging mechanism which inserts a 4-byte tag field in the original Ethernet frame itself between the Source Address and Type/Length fields

http://www.cisco.com/c/en/us/support/docs/lan-switching/8021q/17056-741-4.html#topic2

Question No.90

Which two features must be licensed on a Cisco Nexus 7000 Switch? (Choose two)

  1. Virtual Port Channel

  2. Layer 3

  3. Virtual Device Contexts

  4. iSCSI

  5. Fibre Channel

Correct Answer: BC

Explanation:

Layer 3 license – Enterprise Services Package – LAN_ENTERPRISE_SERVICES_PKG Virtual Device Contexts license – Advanced Services Package –

LAN_ADVANCED_SERVICES_PKG

http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/nx-os/licensing/guide/b _Cisco_NX- OS_Licensing_Guide/b_Cisco_NX-OS_Licensing_Guide_chapter_01.html

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 91-100

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.91

In an IEEE 802.3 Ethernet frame, what is the significance of the DSAP field?

  1. The DSAP field specifies the TCP or UDP port that is associated with the transport protocol.

  2. The DSAP field is only used on United States Department of Defense networks to indicate the information classification level.

  3. The DSAP field is only used in Ethernet II frames.

  4. The DSAP field indicates the network layer protocol.

Correct Answer: D

Question No.92

What is the maximum of fabric modules that can be installed in a Cisco Nexus 7000 chassis?

A.

5

B.

6

C.

4

D.

7

Correct Answer: A

Question No.93

Which command can change the sequence of a router boot process?

  1. config-register

  2. configuration-register

  3. conf-register

  4. config-registration

Correct Answer: A

Question No.94

When comparing TCP and UDP segments, which two fields are found only in TCP segment? (Choose two.)

  1. Checksum

  2. acknowledgement

  3. length

  4. source

  5. Sequence number

Correct Answer: DE

Question No.95

Which two layers of the OSI model are combined in the Internet protocol suite network access layer? (Choose two.)

  1. 1

  2. 2

  3. 3

  4. 4

  5. 5

  6. 6

  7. 7

Correct Answer: AB

Explanation:

http://en.wikipedia.org/wiki/Internet_protocol_suite

Question No.96

A switch is configured to be part of a VTP domain so that its VLAN database is not affected by any changes in the domain. Which mode should be configured on this switch?

  1. client

  2. transparent

  3. server

  4. neutral

Correct Answer: B

Question No.97

Which command displays the Trunking Native Mode VLAN on port Ethernet 1/18?

  1. show running-config switchport e1/18

  2. show running-config e1/18 switchport

  3. show interface e1/18

  4. show interface e1/18 switchport

  5. show interface e1/18 native

Correct Answer: D

Explanation:

NX# show interface e1/18 switchport Access Mode VLAN: 1 (default) Trunking Native Mode VLAN: 1 (default) Trunking VLANs Allowed: 1-4094

Voice VLAN: none

Question No.98

Refer to the exhibit. Which result command is true?

N7k(config)# interface Ethernet 1/1 N7k(config-if)# storm-control broadcast level 0

  1. All broadcast traffic is suppressed on Ethernet 1/1.

  2. All broadcast and multicast traffic is allowed on Ethernet 1/1.

  3. All broadcast traffic is allowed on Ethernet 1/1.

  4. All broadcast and multicast traffic is suppressed on Ethernet E1/1.

Correct Answer: A

Question No.99

Which statement describes the use of zones in a VSAN?

  1. zones are configured at the fabric core.

  2. An HBA or storage device can belong to one zone.

  3. zones limit unicast, multicast, and broadcast traffic.

  4. zones are a group ports within a single VSAN.

Correct Answer: D

Question No.100

To witch component do you connect the Layer 1 port of a fabric interconnect?

  1. Layer 2 port of the opposite fabric interconnect

  2. out-of band management network

  3. Layer 2 port of the same fabric interconnect

  4. Layer 1 port of the opposite fabric interconnect

    Correct Answer: D

    Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.1

Which three addresses are valid forms of an IPv6 Address: 2001:0DB8:0000:FE01:0000:0000:0000:0000? (Choose three.)

A. 2001:0DB8:0000:FE01:: B. 2001:DB8:0:FE01::

C. 2001:0DB8::FE01::

D. 2001:DB8:0:FE01:0:0:0:0

Correct Answer: ABD

Question No.2

Which VTP mode disallows the creation of local VLANs?

  1. transparent

  2. tunneling

  3. server

  4. client

  5. off

  6. native

Correct Answer: D

Explanation:

quot;A VTP client behaves like a VTP server and transmits and receives VTP updates on its trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on another switch in the domain that is in server mode.quot;

http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_52_se/configu ration/guide/swvtp.html#wp1205076

Question No.3

On a Cisco router, which configuration register setting bypasses the contents of the NVRAM?

A. 0x102 B. 0x2102 C. 0x2120 D. 0x2124 E. 0x2142

Correct Answer: E

Question No.4

For witch reason would you implement a VSAN?

  1. to overcome the limitation of zoing

  2. to virtualize storage

  3. to segment the physical fabric into multiple logical fabrics

  4. to overcome the limitations of LUN masking

Correct Answer: C

Question No.5

Which Cisco UCS power policy mode enables a configuration that can tolerate the loss of an input power circuit?

  1. nonredundatnt

  2. Grid

  3. N 1 in normal mode

  4. N 1 in high-density mode

Correct Answer: B

Explanation:

Grid Redundant (N N) – below: The purpose of the grid redundant mode is to enable a configuration that can tolerate the loss of either a power supply or a input power circuit. In grid- redundant mode the system can withstand the loss of any two power supplies. The Figure 5 shows the required wiringScheme for Grid Redundant power where N=2.

Question No.6

Refer to the exhibit. Which host can securely to the switch by using SSH?

image

A.

10.1.15

B.

10.200.200.1

C.

10.2.1.1

D.

10.9.1.2

Correct Answer: A

Question No.7

Which two descriptions of a Fabricpath network are true? (Choose two.)

  1. A leaf node connects to servers.

  2. Leaf nodes can be Layer 3 devices.

  3. A spine node connects to other switch in the fabric.

  4. There is a spanning tree protocol running between leaf and spine switches

  5. A spine node connects to servers.

Correct Answer: BD

Question No.8

Which two networking devices forward data based on destination MAC address? (Choose two.)

  1. Repeater

  2. Bridge

  3. Switch

  4. Router

  5. Hub

Correct Answer: BC

Explanation: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11- 465436.html

Question No.9

What happens when there is no entry in the Layer 2 CAM table that corresponds to the destination MAC address of an incoming frame?

  1. The frame is flooded out of all forwarding ports in all VLANs.

  2. The frame is flooded out of all forwarding ports in its VLAN, except the port on which it is received.

  3. The switch drops the frame.

  4. The frame is flooded out of all forwarding ports in its VLAN, including the port on which it is received.

Correct Answer: B

Question No.10

Which two of the following statements are true with respect to STP in this network? (Choose 2)

  1. Both 5k#39;s have BPDU Guard and BPDU Filter enabled by default, while both 7k#39;s do not

  2. Both 5k#39;s bridge Assurance enabled, while both 7k#39;s do not

  3. 7k#39;s is the root bridge for VLANs 100-150

  4. Both 7K-3 and 7k-4 being vPC peers, are the root bridge for VLANs 100-150

  5. No devices have a root cost higher than 1, since all devices are no more that 1 hop away from each other

Correct Answer: BE

Get Full Version of 200-150 Dumps

Categories
200-150 Dumps

200-150 Real Exam Dumps Questions and answers 11-20

Get Full Version of the Exam
http://www.EnsurePass.com/200-150.html

Question No.11

Which statement about SAN zooming is true?

  1. Describes can belong to more than one zone.

  2. zones must be the same size.

  3. zone membership can be configured only on a pWWN basis.

  4. Hard zoning can be disabled

Correct Answer: A

Question No.12

Refer to the exhibit. What type of network communication is depicted?

image

  1. 802 3 frame

  2. TCP packet

  3. UDP packet

  4. Ethernet frame

Correct Answer: A

Question No.13

Refer to the exhibit. What two conclusions can be mode based upon the output? (Choose two.)

image

  1. regular fromat WWNs are being used

  2. the command show flogl database was run

  3. the command show fcns database vsan 1 was run

  4. registered name formate WWNs are being used

  5. extended format WWNs are being used.

Correct Answer: BE

Question No.14

Which field in an Ethernet II frame performs the same function as the DSAP field in an 802.3 Ethernet frame?

  1. Start of frame

  2. EtherType

  3. Frame check sequence

  4. Subnetwork Access Protocol

  5. Logical Link Control

Correct Answer: B

Question No.15

Which two VTP modes allow the creation of local VLANs? (Choose two.)

  1. transparent

  2. native

  3. server

  4. client

  5. on

Correct Answer: AC

Question No.16

What is the minimum number of disks that are needed in RAID 1?

  1. 4 disks

  2. 2 disks

  3. 8 disks

  4. 16 disks

Correct Answer: B

Question No.17

What is the default bridge ID priority for Rapid PVST ?

A.

128

B.

32769

C.

32768

D.

4096

Correct Answer: B

Question No.18

Which two options describe what can happen when devices are in the same broadcast domain? (Choose two.)

  1. They are on the same VLAN and the same switch.

  2. They are on different VLANs and the same switch.

  3. They are on different VLANs and different switches.

  4. They are on the same VLAN and different switches.

Correct Answer: AD

Question No.19

Refer to the exhibit. You are configuring an extended access list to permit a reply from Destination Server B to Source Host A for HTTP traffic. Which extended access list should you implement on the inbound interface of Router1?

image

  1. router(config)# permit tcp host 209.165.200.230 host 209.165.202.130 eq www

  2. router(config)# permit tcp host 209.165.200.230 eq www host 209.165.202.130

  3. router(config)# permit tcp host 209.165.202.130 host 209.165.200.230 eq www

  4. router(config)# permit tcp host 209.165.202.130 eq www host 209.165.200.230

Correct Answer: A

Question No.20

The MAC address table on a Cisco Nexus Server switch is full .What Layer 2 network behavior will occur while the network MAC address table remains full?

  1. All frames will be flooded.

  2. Frames with an unknown destination address will be flooded.

  3. The switch reset the Mac address table. removin all MAC addresses.

  4. The stitch will remove all dynamically MAC address from the table

Correct Answer: B

Get Full Version of 200-150 Dumps