A. Source and destination interface must be on the same host
B. Source and destination interfaces can be on different hosts
C. Destination vEthernet interface can be on a different VLAN than the source
D. Destination interface can be a physical port
E. Destination interface cannot be a physical port
您可能感興趣的試卷
你可能感興趣的試題
Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration ()
port-profile type Ethernet name VM-Data
vmware port-group
switchport mode trunk
switchport allowed vlan 400-410
channel-group auto mode active
no shut
state enabled
A. Cisco UCS fabric interconnects
B. Pair of N5K’s in VPC
C. Standalone N5K
D. Pair of N5K’s in non-VPC
E. Cisco Catalyst 6000 Switch in VSS
A customer would like to monitor traffic that is being sent to a specific virtual machine named VM001 using SPAN. The customer has another virtual machine configured as a sniffer host called VM002. What configuration is required, and what other changes will need to be made? ()
VSM-PRI-188# sh int vethernet 5
Vethernet5 is up
Port description is VM001, Network Adapter 2
HardwarE. Virtual, address: 0050.56b0.001e (bia 0050.56b0.001e)
Owner is VM "VM001", adapter is Network Adapter 2
Active on module 5
VMware DVS port 484
Port-Profile is VM-vlan-10
Port mode is access
VSM-PRI-188# sh int vethernet 6
Vethernet6 is up
Port description is VM002, Network Adapter 1
HardwarE. Virtual, address: 0050.56b0.0020 (bia 0050.56b0.0020)
Owner is VM "VM002", adapter is Network Adapter 1
Active on module 5
VMware DVS port 485
Port-Profile is VM-vlan-10
Port mode is access
A. Monitor session 1 type span Source interface veth5 both Destination interface veth6 No shut
B. monitor session 1 source vlan 10 destination interface veth6 no shut
C. monitor session 1 type er-span source interface vlan 10 destination ip 10.1.1.10 no shut
D. VM002 must be removed from the Nk1V
E. Move VM002 to Module 5
F. Restart the VEM on module 5
A. validates DHCP messages received from untrusted sources and filters out invalid response messages from DHCP servers
B. intercepts all ARP requests and responses on untrusted ports
C. builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses
D. uses the DHCP snooping binding database to validate subsequent requests from untrusted hosts
E. limits IP traffic on an interface to only those sources that have an IP-MAC address binding table entry or static IP source entry
A Cisco switch has this configuration for a port channel connecting to an ESXi using dual NICs and is intended for use with an N1Kv.
Interface fastethernet 1/10
Switchport mode trunk
Switchport trunk allowed vlan all
Channel-group 10 mode on
No shut
Interface fastethernet 1/11
Switchport mode trunk
Switchport trunk allowed vlan all
Channel-group 10 mode on
No shut
Interface port-channel 10
Switchport mode trunk
Switchport allowed vlan all
No shut
Which Port Channel configuration must be used on the Nexus 1000v port-profile?()
A. MAC pinning
B. Cisco Discovery Protocol pinning
C. Mode On
D. Mode Active
E. No port channel configuration
A. perform flow lookups
B. intercept packets on service enabled ports
C. run packets through the vPath flow manager
D. classify the packets
E. flow manager emits an action for the packets
F. enforce the action determined by the flow manager
最新試題
In a Cisco Unified Computing System, where are SAN port channels connected to?()
What would be the cause for the following fault in UCS Manager?() "ether VIF x / xxx down, reason: ENM source pinning failed"
When will an "all configuration" backup be imported into the Cisco UCS Manager?()
Which statement is true regarding Backup tasks in Cisco UCS?()
Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()
When testing ICMP access to a functional load-balancing ACE VIP, it fails. What is the reason of this problem? ()
Which statement is true about "full state backup" in a Cisco Unified Computing System?()
Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()
Your company wants Server 1/eth0 (vNIC 1) configured so that it always uses Fabric Interconnect A Port Channel 1 (Po1) when it communicates with anything outside of the Cisco UCS domain. However, if vNIC 1 fails over to Fabric Interconnect B using fabric failover, then vNIC 1 can any uplink port on Fabric Interconnect B. Which statements are true? ()
A Cisco Application Control Engine Appliance (ACE) non-admin context does not support "sticky" configuration. What is the reason for this issue?()