Cisco 400-151 - CCIE Data Center Written Exam Exam
Page: 1 / 65
Total 324 questions
Question #1 (Topic: Cisco Data Center L2/L3 Technologies)
Which two statements about VXLAN are true? (Choose two.)
A. VXLAN uses a UDP destination port of 4987.
B. A VTEP is a virtual or physical device that maps end devices to VXLAN segments.
C. Devices that terminate VXLAN tunnels are known as VTEPs.
D. VXLAN adds an additional 32 bytes worth of headers.
Answer: BC
Question #2 (Topic: Cisco Data Center L2/L3 Technologies)
Which two security features are supported by NX-API (Choose two.)
A. NX-API support certificate-based authentication.
B. Users must have appropriate accounts to access the device through NX-API.
C. All communication to the device is encrypted when you use HTTPS.
D. All communication to the device is encrypted when you use VPN.
Answer: BC
Question #3 (Topic: Cisco Data Center L2/L3 Technologies)
Which three guidelines and limitations of policy-based routing are true? (Choose three.)
A. A match command can refer to more than one ACL in a route map for policy-based routing.
B. Setting a tunnel interface or an IP address via a tunnel interface as a next hop in a police-based routing policy is not supported.
C. The same route map can be shared among different interfaces for policy-based routing as long as interfaces belong to the same VRF instance.
D. An ACL used in a policy-based routing route map cannot include a deny statement.
E. A policy-based routing route map can have multiple match or set statements per route-map statement.
F. Policy-based routing and WCCPv2 are not supported on the same interface if bank chaining is disabled.
Answer: BCD
Question #4 (Topic: Cisco Data Center L2/L3 Technologies)
Which statement about VTP bombing is true?
A. It occurs because of configuration mismatch on VTPv3 switches. This problem can be avoided using a confirmation management tool.
B. It occurs when switches with different VTP versions are connected together. This situation may occur when a new switch is plugged into a stable VTP domain. The MAC address table of the new switch overrides the MAC address table of stable switches causing interruption of service.
C. It occurs when a client connects to a switch and launches a distributed denial of service attack against the VTP domain. This attack is possible only ifthe client knows the VTP password.
D. It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier stable database is overwritten. D
Answer: Explanation
Question #5 (Topic: Cisco Data Center L2/L3 Technologies)
Which three options are common PTP device types? (Choose three.)
A. network clock
B. sundials
C. boundary clock
D. transparent clock
E. ordinary clock
F. crystal clock
Answer: CDE