Q1. Which option is one essential characteristic of Cloud computing?
A. It must use virtualization.
B. It must provide load balancing services.
C. It must provide on-demand self service.
D. It must run on open source software.
Answer: C
Q2. Which integrated infrastructure.rely on OpenStack technology?
A. FlexPod
B. Vblock
C. VSPEX
D. OpenBlocks
Answer: D
Q3. Which technology focuses on Layer 2 distributed data centers?
A. FabricPath
B. Adapter FEX
C. LISP
D. OTV
Answer: D
Q4. Which type of zoning is represented?
zone name zone1 vsan 10 member pwwn 20:00:00:55:a5:00:00:04 member pwwn 50:00:d3:10:00:18:e1:05 member pwwn 50:00:d3:10:00:18:e1:06.
A. Single Initiator Multi Target
B. Multi Initiator Single Target
C. Single Target Single Initiator
D. Multi Initiator Multi Target
Answer: A
Q5. Which characteristic is an inoperativeattribute of a private Cloud deployment?
A. self service and on demand
B. shared by many companies
C. highly scalable
D. metered for reporting or billing purposes
Answer: B
Q6. Which statement defines Cloud Service Models?
A. infrastructure as a service, software as a service, platform as a service
B. internet as a service, software as a service, platform as a service
C. infrastructure as a service, big data as a service, platform as a service
D. infrastructure as a service, software as a service, grid as a service
Answer: A
Q7. What are the.five specific characteristics common to the Cloud environments?
A. on-demand usage, ubiquitous access, multi-tenancy, measured usage, resiliency
B. on-demand usage, ubiquitous access, tiered-tenancy, measured usage, resiliency
C. on-demand usage, autonomous access, multi-tenancy, measured usage, resiliency
D. dynamic usage, ubiquitous access, multi-tenancy, measured usage, resiliency
Answer: A
Q8. Which two technologies support running Linux and Windows virtual machines? (Choose two.)
A. KVM
B. LXD
C. Docker
D. Microsoft Hyper-V
Answer: A,D
Q9. Which administrative task is most disruptive to a.Cisco UCS B-Series cluster?
A. reboot of a Fabric Interconnect
B. changing the switching mode of a Fabric Interconnect
C. re-seating a server
D. resetting an IOM
Answer: B
Q10. Which Cloud storage technology would be accessed via the following URL?
https://cloud.example.com/v1/account/container/object
A. pNFS
B. WebDAV
C. Cinder
D. Swift
Answer: D
Q11. Which API structure does Cisco UCS Manager support?
A. JSON
B. XML
C. RUBY
D. PERL
Answer: B
Q12. Cisco APICs utilize sharding to provide what function for an ACI fabric?
A. It provides scalability and reliability to the data sets generated and processed by the Distributed Policy Repository, the endpoint registry, the Observer, and the Topology Manager
B. It provides replication of application network policies across the APICs in the cluster
C. It provides a method for determining which APIC will act as the master in a fabric during the election process
D. It provides horizontal scaling ability for policy management on APICs
Answer: A
Q13. VMware's ESXi Hypervisor is a Type-1 hypervisor. What does this mean?
A. It should be placed first in your data center.
B. It runs a conventional operating system and abstracts the guest operating system from its host system.
C. It should only be run in class 1 data centers with high availability.
D. It runs directly on the host hardware to control and manage the guest operating systems.
Answer: D
Q14. Which option lists Data Center network architectures?
A. core is the top layer, spine is mid layer, leafs are the endpoints the compute nodes
B. DHCPand static IPs Service the cluster of the virtual servers
C. neutron plugins connect virtual machines to.VLANs
D. a data center consists of physical switches and systems using the latest VLAN protocols
Answer: A
Q15. Which Cisco product can provide an iSCSI target for an iSCSI initiator?
A. Cisco MDS 9710
B. Cisco Nexus 7010
C. Cisco UCS Invicta
D. Cisco Nexus 9510
Answer: C
Q16. Which option describes what the use of no_root_squash does in an NFS environment?
A. It causes the NFS share to be mounted by a non-root user and is required for hypervisors that utilize RBAC for users.
B. It allows a NFS share to be mounted and written to as the root user by the hypervisor.
C. It allows a NFS share to be mounted by root, but all subsequent writes are as a non-root user.
D. It allows a NFS share to be mounted by a non-root user and all subsequent writes are as a non-root user.
Answer: B
Q17. Which of the following.best.describes the order of operations of FCoE Initialization Protocol?
A. VLAN Discovery, FCF Discovery, FLOG I/F Discovery, FC Command
B. VLAN Discovery, FCF Discovery, PLOGI Discovery, FLOG I/F Discovery
C. FCF Discovery, PLOGI Discovery, FLOG I/F Discovery
D. VLAN Discovery, FCF Discovery, FLOG I/F Discovery
Answer: D
Q18. Which of the following two.storage technologies would require that its' block device be attached to an instance before you can perform any filesystem commands? (Choose two.)
A. SCSI LUN
B. Cinder Volume
C. NFS Filesystem Meta-Volume
D. Direct Object Block Device
Answer: A,B