2017 July Cisco Official New Released 400-151 Dumps in Lead2pass.com!
100% Free Download! 100% Pass Guaranteed!
There are many companies that provide 400-151 braindumps but those are not accurate and latest ones. Preparation with Lead2pass 400-151 new questions is a best way to pass this certification exam in easy way.
Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/400-151.html
QUESTION 41
Refer to the exhibit. Which option describes when this server reboots?
A. When the vnic/vhba placement is changed
B. When the user acknowledges the reboot
C. Immediately after the next change
D. When the schedule is set to occur.
Answer: A
QUESTION 42
You want to make 80 Gbps of bandwidth available to your Redhat Servers.
Which two statements are true? (Choose 2)
A. Install 2204 IOMs, VIC1240 CNAs, fabric Extenders, and create four vNICs mapped to each fabric.
B. Install 2208 IOMs, VIC1280 CNAs, fabric Extenders, and create four vNICs mapped to each fabric.
C. Install 2208 IOMs, VIC1280 CNAs, fabric Extenders, and create eight vNICs mapped to each fabric.
D. Install 2204 IOMs, VIC1280 CNAs, fabric Extenders, and create four vNICs mapped to each fabric.
E. Install 2204 IOMs, VIC1280 CNAs, and create four vNICs mapped to each fabric.
F. Install 2204 IOMs, VIC1240 CNAs, and create four vNICs mapped to each fabric.
Answer: CF
QUESTION 43
Refer to the exhibit. Which two options are possible reasons for device being stuck in “init” mode? (Choose 2)
A. Incorrect VM is selected
B. Incorrect “Function type” is selected.
C. No “Chassis” is selected.
D. “Http service enable” is not configured on the ASA
E. Incorrect credentials are provided
F. No management interface is specified in “cluster interfaces” section
Answer: DE
QUESTION 44
Refer to the exhibit. After you upgrade Cisco UCS firmware, some of your blades have these error messages. Which description of the problem is true?
A. Storage provisioning is not configured
B. vNIC template must be converted to updating.
C. Some components are deprecated.
D. Service profile requires as connectivity policy.
Answer: D
QUESTION 45
After VTEP devices are established BGP neighbor adjacencies with other VTEPs or with internal BGP route reflector, which three pieces of information are exchanged through BGP? (Choose 3)
A. Layer 3 VNI
B. VPNv4 prefixes
C. Router MAC address
D. VTEP peer list
E. VTEP address
Answer: ACE
QUESTION 46
Which three statements about IP source guard are true? (Choose 3)
A. IP source Guard is dependent upon DHCP snooping to build and maintain the IP-MAC-Address binding table or upon manual maintenance of static IP-source entries.
B. IP source guard requires that CHCP snooping is disabled.
C. By default, IP source guard is enabled on all interfaces.
D. IP source guard limits IP traffic on an interface to only those sources that have an IP=MAC address binding table entry or static IP source entry.
E. When you first enable IP source guard on an interface, you may experience disruption in IP traffic until the hosts on the interface receive an new IP address from a DHCP server.
Answer: ADE
QUESTION 47
Which three PVLAN port models are supported on Cisco necus 9000? (Choose 3)
A. Isolated host
B. FEX port
C. Port Channels
D. Isolated host trunk
E. Virtual port channels
F. Community host
Answer: ADF
QUESTION 48
Which two statements about policing, queuing, and scheduling are true? (Choose 2)
A. You can schedule traffic by imposing a maximum data rate on a class of traffic so that excess packets are dropped.
B. Policing is the monitoring of data rates for a particular class of traffic. The device can also monitor associated burst sizes.
C. You can apply weighted random early detection to a class of traffic, which allows packets to be dropped to be dropped based on the CoS field.
D. The WRED algorithm is reactive approach only to traffic congestion.
Answer: BC
QUESTION 49
Which three main functions are provided by OTV to achieve failure isolation? (Choose 3)
A. ARP optimization
B. Use of multiple OTV overlays
C. Unknown unicast traffic suppression
D. Spanning tree isolation
E. Optimal outbound routing
Answer: ACD
QUESTION 50
Refer to the exhibit. Within an ACI fabric, routing protocol is need to assist with router redistribution between the outside networks and the internal fabric.
Which routing protocol is needed to run in the fabric at location 1 to allow the VM access to the networks advertised by the external layer 3 network?
A. MP-BGP
B. EBGP
C. iBGP
D. OSPF
E. IS-IS
Answer: A
QUESTION 51
Which two statements about import and export route control an ACL fabric are true?
A. Export route control controls if the prefixes are redistributed from MP-BGP to the egress leaf.
B. Prefixed learned from BGP L3 outs cannot be fileted inbound.
C. Prefixes learned from OSPF/EIGRP L3 outs are never permitted inbound by default.
D. Prefixes permitted inbound are redistributed into MP-BP at the ingress leaf.
Answer: AD
QUESTION 52
Which two options does ITD replace? (Choose 2)
A. Policy-based routing.
B. WCCP
C. Access lists
D. Layer 7 load balancer
E. Layer 4 Load balancer
F. IP SLA
Answer: AB
QUESTION 53
Which two security features are supported by NX-API? (Choose 2)
A. NX-API support certificate-based authentication
B. All communication to the device is encrypted when you use HTTPS.
C. All communication to the device is encrypted when you use VPN.
D. User must have appropriate accounts to access the device through NX-API
Answer: BD
QUESTION 54
Which three statements about ACI border leaf are true? (Choose 3)
A. Only 32 border leaves are supported in an ACI fabric.
B. Any ACI leaf can be a border leaf. There is no limitation in the number of leaf switches that can be used as border leaves.
C. The border leaf can also be used to connect to compute, IP storage, and service appliances.
D. The border leaves are dedicated leaf switches that support only Layer 2 and Layer 3 out in an ACI fabric.
E. The border leaves are ACI leaves that provide Layer 3 connections to outside networks.
Answer: BCE
Explanation:
Border Leaves
The border leaves are ACI leaves that provide layer 3 connections to outside networks. Any ACI leaf can be a border leaf. These can also simply be called leaf switches. There is no limitation in the number of leaf switches that can be used as border leaves. The border leaf can also be used to connect to compute, IP storage, and service appliances. In large-scale design scenarios it may be preferred to have border leaf switches separated from the leaves that connect to compute and service appliances for scalability reasons.
http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c07-732033.html
QUESTION 55
In which EPG is the consumer interface of an L4-L7 device places?
A. Shadow provider EPG
B. Shadow consumer EPG
C. Consumer EPG
D. Provider EPG
Answer: B
QUESTION 56
Which three statements are considered best practice when configuring an NFS appliance port on Cisco UCS? (Choose 3)
A. If storage is configured in active/passive mode and both fabric interconnects require communication to the same controller, then the appliance port VLANs should be allowed on the upstream switches.
B. Cisco UCS supports static and link aggregation control protocol port channels for appliance port configuration. However, no virtual port channel support.
C. If storage and servers are located in the same subnets, then the appliance port VLSNA should be allowed on the upstream switch.
D. Use of the same VLAN for multiple storage protocol traffic is highly recommended to conserve VCLAN namespace use.
E. If storage must be accessed outside of the cisco UCS domain, then the appliance port VLANs should be allowed on the upstream switch.
F. Configuration of the VLAN tagging on the storage side and on the Cisco UCS side simultaneously is recommended.
Answer: ACE
Explanation:
Why Appliance Port VLANs Should be Allowed on Uplinks
There are number of reasons why an upstream switch should allow storage appliance port traffic. These include:
If storage must be accessed outside of the UCS domain.
If storage and servers are located in different subnets.
If storage is configured in Active/Passive mode and both fabric interconnects require
communication to the same controller.
In certain failover scenarios.
http://www.cisco.com/c/en/us/support/docs/servers-unified-computing/ucs-5100-series-blade-
server-chassis/116075-ucs-app-connectivity-tshoot-00.html
QUESTION 57
Which OpenStack project, whose data can be used to provide customer billing, resource tracking, and alarming capabilities across all OpenStack core components, is a component of the telemetry project?
A. Trove
B. Ceilometer
C. Heat
D. Ceph
Answer: B
Explanation:
http://docs.openstack.org/developer/ceilometer/
Ceilometer is a component of the Telemetry project. Its data can be used to provide customer billing, resource tracking, and alarming capabilities across all OpenStack core components.
QUESTION 58
Which three limitations or requirements do MP-BGP-Based EVPN addresses have compared to the initial IETF VXLAN standard (RFC 7348)? (Choose 3)
A. Scalability limitation due to data-driver flood-and-learn behavior.
B. Control-Plane learning of end-host layer 2 and layer 3 reachability information, which provides integrated bridging and routing in VXLAN overlay networks
C. Network flooding through protocol-based host MAC/IP router distribution and ARP suppression on the local VTEPs.
D. Active-passive multihoming at layer 2
E. Requirement to disable multicast for underlay forwarding.
Answer: ABC
QUESTION 59
Which Cisco UCS Director feature Provides API Information and API code generation capabilities that make it easy to see and work with all the available API’s, including the REST API’s and the JAVA API’s?
A. Automation Feature set
B. REST API Browser
C. Report metadata
D. Orchestration feature set
Answer: B
QUESTION 60
Which statement about glean throttling in Cisco NX-OS is true?
A. When forewarding an incoming IP Packet in a line card, if the address resolution request for the next hop us not resolved, the line card forwards the packets to the supervisor. The supervisor resolves the MAC address for the next hop and programs the hardware.
B. The traffic shaping feature is cisco NX-os to avoid bottle necks in the network.
C. The traffic policing feature manages the maximum rate of traffic through a token bucket algorithm. The token bucket algorithm can use the user-configured values to determine the maximum rate of traffic allowed on an interface at a given moment in time.
D. Cisco NX-os supports a rate-limiting feature to manages the access bandwidth policy for network by ensuring that traffic falling within specified rate parameters is sent, while dropping packets that exceed the acceptable amount of traffic or sending them with a different priority.
Answer: A
We give you the proper and complete training with free 400-151 Lead2pass updates. Our braindumps will defiantly make you perfect to that level you can easily pass the exam in first attempt.
400-151 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDQ0lSRmpvekFXeWs
2017 Cisco 400-151 exam dumps (All 372 Q&As) from Lead2pass:
https://www.lead2pass.com/400-151.html [100% Exam Pass Guaranteed]