Dumpsschool offers the best and valid Cisco 400-151 Exam Dumps. Pass Cisco 400-151 Exam in First Attempt! Get the latest actual exam questions for
Cisco 400-151 Exam in the practice test software form.
Try it Latest DumpsSchool 400-151 Exam dumps. Buy Full File here: https://www.dumpsschool.com/400-151-exam-dumps.html (395 As Dumps)
Download the DumpsSchool 400-151 braindumps from Google Drive: https://drive.google.com/file/d/1VchPuNfJPo2E4-o2Qize2Uh1sL38lLno/view (FREE VERSION!!!)
Question No. 1
Which option lists the cloud service model?
A. Internet as a Service, Platform as a Service, and Software as a Service
B. Internet as a Service, Product as a Service, and Storage as a Service
C. Infrastructure as a Service, Platform as a Service, and Storage as a Service
D. Infrastructure as a Service, Platform as a Service, and Software as a Service
E. Internet as a Service, Platform as a Service, and Storage as a Service
Question No. 2
Refer to the exhibit.
Which purpose of the ipospf transmit-delay command is true?
A. This variable adds a specified time to the age field of an OSPF update. This parameter has more significance on very low-speed links.
B. This variable is used to negotiate transmit –delay with the OSPF neighbors.
C. This variable is used by the OSPF to send hello packets periodically after the time specified in the transmit-delay command.
D. This variable sends the OSPF database to the neighbors periodically after the time specified in the transmit-delay command.
Question No. 3
Which two statements about configuring the Intermediate System-to-Intermediate System domain policy on an ACI Fabric are true? (Choose two)
A. The IS-IS LSP generation initial wait, maximum wait, and second wait intervals can all be configured.
B. The IS-IS fast-flooding of link state packets improves IS-IS convergence time
C. The IS-IS default MTU is set at 4352, and it cannot be changed
D. The IS-IS domain policy is configured under Fabric > Global Policies
E. The IS-IS domain policy is configured under Fabric > Access Policies
F. Cisco Nexus stitches do not have a concept of DR due to vPC
G. PIM exchanges unicast hello messages between all routers advertised by the anycast RP
H. PIM hello messages are sent to 126.96.36.199 and the router with the highest priority is selected as the DR
I. PIM hello messages are sent to 188.8.131.52 and the router with the lowest priority is selected as the DR
A, B Answer:
Question No. 4
Which three configuration can be different between EVPN vPC peers? (Choose three.)
A. Using a different secondary IP address
B. Consistent NVE1 binding to the same loopback interface
C. Consistent VLAN to VN-segment mapping
D. Consistent VNI to group mapping
E. Using the same primary IP addresses
F. Loopback primary IP address
A, E, F Answer:
Question No. 5
You want to move one of your leaf switches connecting to your ACI fabric to another rack.it will be reconnected to the same fabric after the move. Which operations must you preform before the move?
A. Decommission the switch and remove from the controller
B. Decommission the switch
C. Blacklist the ports
D. Disable the interfaces
Question No. 6
Which standard REST API method allows you to create a managed object?
Question No. 7
Which two statements about the configuration of APIC controllers in the ACI Fabric are true? (Choose two.)
A. Commissioning an APIC can be done via the APIC UI, but decommissioning an APIC must be done using
B. Cluster controllers added to the APIC must be running the same version of firmware.
C. An APIC cluster is comprised of multiple controllers that provide monitoring, diagnostic, and configuration capability.
D. When performing planned changes to the cluster, at least one controller in the cluster must be healthy.
E. APIC cluster size is set during the initial setup script, and after it is configured it requires a nondisruptive reinitialization of the APIC cluster to change.
B, C Answer:
Question No. 8
Which two steps only allow access to the supplier management database application in EPG ‘DB-EPG’ through VPN connection using subnet 10.10.10.0/16? (Choose two.)
A. Create an external network under L3Out. Add subnet 10.10.10.0/16 with scope ”External Subnets for the External EPG”
B. Assign a contract as ”Consumer Contract” in an external network under L2Out.
C. Create an EPG and name it ”VPN-Access”. Create a bridge domain with subnet 10.10.10.0/16 and associate it with ”VPN-Access” EPG. Create a contract as ”Provider Contract” in EPG.
D. Create an EPG and name it ”VPN-Access”. Create a bridge domain with subnet 10.10.10.1/16 and associate it with ”VPN-Access” EPG. Create a contract as ”Provider Contract” in EPG.
E. Assign a contract as ”Provider Contract” in DB-EPG
A, B Answer:
Question No. 9
You want to create two vHBAs per fabric for each server in a Cisco UCS domain. Which option lists the maximum number of servers that can be utilized in this domain?
A. 12 chassis (96 servers)
B. 20 chassis (160 servers)
C. 15 chassis (120 servers)
D. 16 chassis (128servers)
Question No. 10
Refer to the exhibit.
Which two statements about spanning tree are true? (Choose two.)
A. BPDUs from a VPC are processed on this switch.
B. This switch generates BPDUs for a VPC.
C. BPDUs are sent to the peer switch for processing.
D. This switch cannot generate BPDUs for a VPC.
E. BPDUs received on this switch are dropped because Type 2 inconsistency issues.
C, D Answer:
Question No. 11
Which two connectivity modes does Cisco RISE support? (Choose 2)
A. Directly connected. No virtual port channel is supported.
B. Indirectly connected. Only Layer 3 adjacent.
C. Indirectly connected. Only Layer 2 adjacent
D. Indirectly connected. Layer 2 and Layer 3 adjacent.
E. Directly connected. Virtual port channel is supported.
C, E Answer:
Question No. 12
Which description of how to enable DIMM blacklisting is true?
A. Enable blacklisting in the servers > policy subtab
B. Enable blacklisting in the servers inventory > memory subtab
C. Configure a memory policy under the services tab
D. Configure a memory policy in the equipment > policy subtab
Question No. 13
Which multicast destination MAC address is assigned to LACP?
Question No. 14
Which statement about VTP bombing is true?
A. It occurs because of configuration mismatch on VTPv3 switches. This problem can be avoided using a confirmation management tool.
B. It occurs when switches with different VTP versions are connected together. This situation may occur when
C. It occurs when a client connects to a switch and launches a distributed denial of service attack against the VTP domain. This attack is possible only if the client knows the VTP password.
D. It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier stable database is overwritten.
Question No. 15
How do you preprovision a Cisco UCS chassis?
A. Configure server pool policies for the chassis.
B. Associate service profiles to each slot.
C. Associate a service profile template to the chassis.
D. Select preprovision from the general menu of the chassis.
Question No. 16
Which statement about hard pinning is true?
A. When the VLAN validation fails, a VIF down fault is raised.
B. When the VLAN validation fails, a VLAN Mismatch fault with a severity of Warning appears
C. If no uplink Ethernet port or port channel is configured with all VLANs on the vNIC, Cisco UCS
D. If no uplink Ethernet port or port channel is configured with all VLANs on thevNIC, Cisco UCS Manager brings the link down
400-151 Dumps Google Drive: (Limited Version!!!)
Vendor: Cisco dumps