多项选择题
Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration ()
port-profile type Ethernet name VM-Data
vmware port-group
switchport mode trunk
switchport allowed vlan 400-410
channel-group auto mode active
no shut
state enabled
A. Cisco UCS fabric interconnects
B. Pair of N5K’s in VPC
C. Standalone N5K
D. Pair of N5K’s in non-VPC
E. Cisco Catalyst 6000 Switch in VSS
相关考题
-
多项选择题
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? () VSM-PRI-188# sh int vethernet 5 Vethernet5 is up Port description is VM001, Network Adapter 2 HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e) Owner is VM "VM001", adapter is Network Adapter 2 Active on module 5 VMware DVS port 484 Port-Profile is VM-vlan-10 Port mode is access VSM-PRI-188# sh int vethernet 6 Vethernet6 is up Port description is VM002, Network Adapter 1 HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020) Owner is VM "VM002", adapter is Network Adapter 1 Active on module 5 VMware DVS port 485 Port-Profile is VM-vlan-10 Port mode is access
A. Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shut
B. monitor session 1 source vlan 10 destination interface veth6 no shut
C. monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shut
D. VM002 must be removed from the Nk1V
E. Move VM002 to Module 5
F. Restart the VEM on module 5 -
多项选择题
DHCPsnoopingonCiscoNexus1000VSeriesSwitchesactslikeafirewallbetweenuntrustedhostsandtrustedDHCPserversbydoingwhichofthese?()
A. validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
B. intercepts all ARP requests and responses on untrusted ports
C. builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
D. uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
E. limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry -
单项选择题
A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv. Interface fastethernet 1/10 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface fastethernet 1/11 Switchport mode trunk Switchport trunk allowed vlan all Channel-group 10 mode on No shut Interface port-channel 10 Switchport mode trunk Switchport allowed vlan all No shut Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
A. MAC pinning
B. Cisco Discovery Protocol pinning
C. Mode On
D. Mode Active
E. No port channel configuration
