Download CCIE Data Center Written Exam.pass4sure.400-151.2020-01-24.1e.207q.vcex

Download Exam

File Info

Exam CCIE Data Center Written Exam
Number 400-151
File Name CCIE Data Center Written Exam.pass4sure.400-151.2020-01-24.1e.207q.vcex
Size 12.06 Mb
Posted January 24, 2020
Downloads 29

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Coupon: EXAM_HUB

Discount: 20%


Demo Questions

Question 1
Which two statements about VXLAN are true? (Choose two.)

  • A: VXLAN uses a UDP destination port of 4987.
  • B: A VTEP is a virtual or physical device that maps end devices to VXLAN segments.
  • C: Devices that terminate VXLAN tunnels are known as VTEPs.
  • D: VXLAN adds an additional 32 bytes worth of headers.

Question 2
Which two security features are supported by NX-API (Choose two.)

  • A: NX-API support certificate-based authentication.
  • B: Users must have appropriate accounts to access the device through NX-API.
  • C: All communication to the device is encrypted when you use HTTPS.
  • D: All communication to the device is encrypted when you use VPN.

Question 3
Which three guidelines and limitations of policy-based routing are true? (Choose three.)

  • A: A match command can refer to more than one ACL in a route map for policy-based routing.
  • B: Setting a tunnel interface or an IP address via a tunnel interface as a next hop in a police-based routing policy is not supported.
  • C: The same route map can be shared among different interfaces for policy-based routing as long as interfaces belong to the same VRF instance.
  • D: An ACL used in a policy-based routing route map cannot include a deny statement.
  • E: A policy-based routing route map can have multiple match or set statements per route-map statement.
  • F: Policy-based routing and WCCPv2 are not supported on the same interface if bank chaining is disabled.

Question 4
Which three options are common PTP device types? (Choose three.)

  • A: network clock
  • B: sundials
  • C: boundary clock
  • D: transparent clock
  • E: ordinary clock
  • F: crystal clock

Question 5
Which three main functions are provided by OTV to achieve failure isolation? (Choose three.)

  • A: optimal outbound routing
  • B: unknown Unicast traffic suppression
  • C: ARP optimization
  • D: use of multiple OTV overlays
  • E: Spanning Tree isolation
  • F: unicast policy control

Question 6

Refer to the exhibit. If you inspect a VXLAN packet at point 2, which two options about the outer fields in the VXLAN header are two? (Choose two.)

  • A: Outer S-IP = IP-1 ; Outer D-IP = IP-2.
  • B: Outer S-IP = IP-A : Outer D-IP = IP-B.
  • C: Outer S-MAC = MAC-1 ; Outer D-MAC= MAC-4.
  • D: Outer S-MAC = NAC-A ; Outer D-MAC = MAC-B.
  • E: Outer S-IP = IP-1 ; Outer D-IP = IP-4.
  • F: Outer S-MAC = MAC-1 ; Outer D-MAC = MAC-2

Question 7
Which three statements about ASM and SSM are correct? (Choose three.)

  • A: By default, the SSM group range for PIM is and for PIM6 is FF3x/96.
  • B: PIM ASM is not fully supported on a vPC.
  • C: In ASM mode, only the last-hop router switches from the shared tree to theSPT.
  • D: ASM mode requires that you configure an RP.
  • E: If you want to use the default SSM group range, you must configure the SSM group range.

Question 8

Refer to the exhibit. Within an ACI fabric, a routing protocol is needed to assist with route redistribution between the outside networks and the internal fabric. Which routing protocol is needed to run in the fabric at location 1 to allow the VM access to the networks advertised by the external Layer 3 network.

  • A: iBGP
  • B: eBGP
  • C: IS-IS
  • D: MP-BGP
  • E: OSPF

Question 9
Which two statements about CFS are true? (Choose two.)

  • A: CFS distributes the local NTP configuration to masteronly which then forwards it to all devices in network.
  • B: After enabling CFS, a network-wide lock is applied to NTP whenever an NTP configuration is started and released once after the change has been committed or discarded.
  • C: If CFS is used to distribute NTP, all devices in the network must have the different VRFs configured then as used for NTP.
  • D: You must manually distribute NTP authentication keys on the NTP server and Cisco NX-OS devices across the network.
  • E: CFS requires a license to be installed before it can be used to distribute NTP.

Question 10

Refer to the exhibit. When specifying subnets under a bridge domain for a given tenant, the user can specify the scope of a subnet. Which definition of the public subnet scope is true?

  • A: It indicates that this subnet is advertised to the external router by the border leaf.
  • B: It indicates that this subnet is advertised to the border leaf in ACI fabric.
  • C: It indicates that it must be leaked to one or more private networks within ACI fabric.
  • D: It indicates that this subnet is advertised to public Internet and must be protected by a firewall.



You can buy ProfExam with a 20% discount..

Get Now!


Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen


Use VCE Exam Simulator to open VCE files