web analytics

Which statement about file-level storage is true?

Which statement about file-level storage is true? A. It is well suited for bulk file storage. B. Support external boot-up of systems connected to them. C. It is complicated to

When considering a private cloud integrated infrastructure, which solution is prebuilt and tested before being delivered to a customer only using EMC, Cisco, and VMware?

When considering a private cloud integrated infrastructure, which solution is prebuilt and tested before being delivered to a customer only using EMC, Cisco, and VMware? A. FlexPod B. VBlock C.

Which two private cloud integrated infrastructures provide reference architectures?

Which two private cloud integrated infrastructures provide reference architectures? (Choose two.) A. VBlock B. IAC C. VSPEX D. Oracle E. FlexPod Correct Answer: BE

Which solution is the most appropriate for this environment?

A cloud administrator is considering the appropriate solution to automate a private cloud deployment. The solution requires focus on Cisco UCS integrated infrastructure and automating application stacks. Which solution is

Which two storage connectivity types are most widely used for VMFS datastores?

Which two storage connectivity types are most widely used for VMFS datastores? (Choose two.) A. iSCSI B. FC/FCoE C. NFS D. CIFS E. SCSI Correct Answer: AB

Which three statements about DPI are true?

A cloud administrator is considering deep packet inspection to secure the cloud infrastructure. Which three statements about DPI are true? (Choose three.) A. The use of DPI makes it possible

Which three infrastructure security elements are important when designing a secure mufti tenant environment?

Which three infrastructure security elements are important when designing a secure mufti tenant environment? (Choose three.) A. internal and external separation using 802.1q and virtual port channels B. NGPS C.

Which product is most beneficial to this effort?

A cloud administrator must deploy a virtualized multi tenant data center. The admin focuses efforts on restricting access control. Which product is most beneficial to this effort? A. ASA 5585

Which statement about thin provisioning is true?

Which statement about thin provisioning is true? A. The disk is allocated and zeroed on demand as the space is used. B. The disk has all space allocated at time

Which three network services are offered by Microsoft Azure?

Which three network services are offered by Microsoft Azure? (Choose three.) A. elastic load balancing B. traffic manager route incoming traffic for high performance and availability C. intrusion detection systems,

Which large-scale Layer2 connectivity protocol is best for VLAN address space that is limited in large networks?

Which large-scale Layer2 connectivity protocol is best for VLAN address space that is limited in large networks? A. VXLAN B. OTV C. LISP D. VPN E. NvGRE Correct Answer: A

Which three entities can the prime service catalog be integrated with Cisco UCS Director to discover and create orderable services?

For which three entities can the prime service catalog be integrated with Cisco UCS Director to discover and create orderable services? (Choose three.) A. fenced templates, fenced catalogs B. advanced

Which option is the Application Stack-as-a-Service feature available while using Stack Designer to design an application stack?

With which option is the Application Stack-as-a-Service feature available while using Stack Designer to design an application stack? A. virtual appliance B. design mode C. keystone D. manual appliance Correct

Which policy is set up first?

An administrator is configuring policies during the initial configuration of Cisco UCS Director. Which policy is set up first? A. network B. computing C. system D. storage Correct Answer: B

Which three cloud providers are supported by Cisco Intercloud Fabric for Business?

Which three cloud providers are supported by Cisco Intercloud Fabric for Business? (Choose three.) A. Amazon Hybrid Cloud B. Microsoft Azure C. Dell Cloud Computing D. Cisco Hybrid Cloud Bundle

Which two ways can the administrator accomplish this task?

A system administrator must use Cisco UCS Director to migrate several virtual machines from one host to another without disrupting the workload. In which two ways can the administrator accomplish

Which solution provides centralized automation and policy-driven application profiles?

Which solution provides centralized automation and policy-driven application profiles? A. APIC B. OpenDaylight C. VACS D. CML Correct Answer: A

Which solution meets this need the best?

A cloud administrator is considering storage for a deployment. The admin needs a solution that is durable and reliable and fits the need for storing media, web assets, and backups.

Which solution is most appropriate for this environment?

A cloud administrator is considering the appropriate solution to automate a hybrid cloud deployment. The solution requires a single pane of glass infrastructure management, monitoring, health dashboard, orchestration and a

Which two products are the most beneficial to these efforts. (Choose two.)

A cloud administrator must deploy a private Cloud. The design is focused on the need to accelerate applications delivered from private and virtual private cloud infrastructure, using policy-based on-demand orchestration.

Which statement about VACS is true?

Which statement about VACS is true? A. It provides centralized provisioning and orchestration for physical and virtual networking. B. It is designed around open standards and open APIs. C. It

Which two options are Cisco Intercloud Fabric Deployment Models?

Which two options are Cisco Intercloud Fabric Deployment Models? (Choose two.) A. enterprise managed B. enterprise DMZ controlled C. small office home office deployment D. service provider managed hybrid cloud

Which option does not relate to the zero trust model?

Which option does not relate to the zero trust model? A. secure access B. orchestration C. intrusion protection system D. segmentation Correct Answer: B

Which two options need to be considered to build a context aware infrastructure?

Which two options need to be considered to build a context aware infrastructure? (Choose two.) A. VLAN segmentation for every application type. B. The design of data formats and network

Which three hypervisors are able to support High Availability for Virtual Machines?

Which three hypervisors are able to support High Availability for Virtual Machines? (Choose three.) A. Microsoft Virtual PC B. Citrix C. Parallels Desktop D. HyperV E. RedHat F. VMWare Correct

Which three statements about data plane protection are true?

A cloud administrator is considering methods for securing the cloud infrastructure. Which three statements about data plane protection are true? (Choose three.) A. You must preplan security policies and test

Which protocol is used to extend Layer 2 for long-distance bridging?

Which protocol is used to extend Layer 2 for long-distance bridging? A. OTV B. VXLAN C. LISP D. VPN E. NvGRE Correct Answer: A

Which module must a manager or supervisor review and authorize the service when an end user submits an order in the prime service catalog?

From which module must a manager or supervisor review and authorize the service when an end user submits an order in the prime service catalog? A. Order Management B. Service

Which two statements are the goals of these policies?

A cloud administrator is designing role-based access control security policies for a private Cloud. Which two statements are the goals of these policies? (Choose two.) A. to ensure that no

Which three options are examples of resiliency in the data center?

Which three options are examples of resiliency in the data center? (Choose three.) A. infrastructure hardening B. IPS appliances C. policy enforcement and access control D. firewalls E. application redundancy

Which two options are Cisco Intercloud Fabric use cases?

Which two options are Cisco Intercloud Fabric use cases? (Choose two.) A. development and testing B. capacity reduction C. legal compliance D. secure administrative access E. shadow IT control Correct

Which three options describe how isolation can be achieved for VMDC data center security?

Which three options describe how isolation can be achieved for VMDC data center security? (Choose three.) A. access control lists B. intrusion prevention appliances that inspect traffic and detect security

Which two design concerns should have priority?

An administrator is designing a cloud environment to support multi-tenancy. The customers will share infrastructure, applications, and databases. Which two design concerns should have priority? (Choose two.) A. core layer

Which two ways can this task be accomplished?

A UCS Director administrator must migrate a VM from a hypervisor to a pubic cloud. In which two ways can this task be accomplished? (Choose two) A. You can perform

Which three components are involved in the design of Cisco Secure cloud extension?

Which three components are involved in the design of Cisco Secure cloud extension? (Choose three) A. Intercloud Fabric Extender B. Amazon Hybrid Cloud C. third party firewall to secure the

Which two product configurations are provided by Cisco Intercloud Fabric architecture?

Which two product configurations are provided by Cisco Intercloud Fabric architecture? (Choose two.) A. Cisco Intercloud fabric for Business B. Cisco Intercloud fabric for Providers C. Cisco Intercloud fabric for

Which wizard will help accomplish this task?

A Cisco UCS Director administrator is setting up policies to provision VMs. Which wizard will help accomplish this task? A. Initial System Configuration B. FlexPod Configuration C. vDC Creation D.

Which two options does this approach require?

Service providers can use multi tenant data centers to efficiently and economically provide cloud services using shared hardware and network infrastructures. Which two options does this approach require? (Choose two)

Which three statements about block-level storage are correct?

Which three statements about block-level storage are correct? (Choose three.) A. It is less expensive and simple to implement. B. Block-level storage systems are very popular with SAN. C. It

Which service will accomplish this task?

ABC Company wants to increase developer productivity and decrease the application time to market. Which service will accomplish this task? A. Infrastructure-as-a-Service B. Platform-as-a-Service C. Software-as-a-Service D. Database-as-a-Service Correct Answer:

Which three options does Cisco Intercloud Fabric provide?

Which three options does Cisco Intercloud Fabric provide? (Choose three.) A. Workload security throughout the resulting hybrid clouds. B. Ability to build, test, and validate IaaS architecture in a nonproduction

Which statement is true about CIFS?

Which statement is true about CIFS? A. It is used with Hyper-V 2012 and SQL server 2012. B. It is home directories for UNIX environments. C. It is used as

Which two security capabilities does Intercloud Fabric provide for hybrid clouds. (Choose two.)

A cloud administrator is designing security policies for a hybrid cloud using Cisco Intercloud Fabric. Which two security capabilities does Intercloud Fabric provide for hybrid clouds. (Choose two.) A. open

Which two statements about designing an application stack using Stack Designer are true?

Which two statements about designing an application stack using Stack Designer are true? (Choose two.) A. Using Stack Designer, application stack services are created by removing the application component in

Which three resources are required on the destination host for a successful migration?

A system administrator must do a hot migration. Which three resources are required on the destination host for a successful migration? (Choose three.) A. VLAN B. vNIC speeds C. CPU

Which describes the best option when beginning a cloud design?

Which describes the best option when beginning a cloud design? A. Outline every challenge in the data center in a business justification document. B. Switch to a single hypervisor provider.

Which two statements about control plane Cloud Security are true?

A cloud administrator is designing security policies for the control plane of a private Cloud. Which two statements about control plane Cloud Security are true? (Choose two.) A. The dynamic

Which two ports are used by Intercloud fabric tunnel ports?

Which two ports are used by Intercloud fabric tunnel ports? (Choose two.) A. TCP6644 and 6646 B. TCP6000 and 7010 C. UDP 6644 and 6646 D. TCP7000 and 7010 Correct