[2017 New] Free Downloading 400-151 Exam Dumps PDF From Lead2pass (61-80)

2017 July Cisco Official New Released 400-151 Dumps in Lead2pass.com!

100% Free Download! 100% Pass Guaranteed!

Lead2pass is ready to provide Cisco candidates with 400-151 exam dumps which can be very helpful for getting Cisco certification, which means that candidates can easily get access to the services of Cisco 400-151 exam dumps, which will assure them 100% passing success rate. With Lead2pass 400-151 exam dumps, it will be easy to pass your 400-151 exam at your first time.

Following questions and answers are all new published by Cisco Official Exam Center: https://www.lead2pass.com/400-151.html

QUESTION 61
Which platform support ITD?

A.    NEXUS 7000, NEXUS 9000, NEXUS 6000, NEXUS 5000
B.    NEXUS 7000, NEXUS 9000 ONLY
C.    NEXUS 7000, NEXUS 9000, and NEXUS 6000 only
D.    Nexus 700 with F3 line cards only.
E.    Nexus 7000, Nexus 9000, and Nexus 5000 Only

Answer: A

QUESTION 62
Which three statements are considered best practice when directly connecting converged network adapters to the fabric?

A.    Cisco Unified fabric links must be configured as access ports and FCoE VLAN must not be configured as a native VLAN.
B.    A shared VLAn can be used to carry traffic for each virtual fabric in the SAN (for example, vlan 1002 for VSAN1, VSAN2, and so on)
C.    Separate FCoE VLANS must be used for FCOE in SAN-A and SAN-B.
D.    If the converged access switches (in the same SAN fabric or in the other) must be connected to each over Ethernet Links for the purposes of LAN alternate pathing, then such links must explicitly be configured to include all FCOE vlans. This configuration ensures to extend the scope of the spanning tree protocol for FCOE vlans to cisco unified fabric and non cisco unified fabric links.
E.    Cisco UF links must be configured as spanning-tree edge ports.
F.    If MSTP is enabled, a separate MST instance must be used for FCOE vlans.

Answer: CEF

QUESTION 63
Which statement about VTP bombing is true?

A.    It occurs when switches with different VTP versions are connected together. This situation may occur when a new switch is plugged into a stable VTP domain. The MAC address table of the new switch overrides the MAC address table of stable switches causing interruption of service.
B.    It occurs when a client connects to a switch and launches distributed denial of service attack against the VTP domain. This attack is possible only if the client knows the VTP password.
C.    It occurs when a server with a higher revision number and a wrong VTP database is inserted into the VTP domain. This situation may occur when a new switch is plugged into a stable VTP domain. The incorrect database is propagated to the domain and the earlier state database is overwritten.
D.    It occurs because of configuration mismatch on VTPv3 switches. This problem can be avoided using a confirmation management tool.

Answer: C

QUESTION 64
Refer to the exhibit. Which cause of this error is true?

 

A.    The upstream switch port is disabled.
B.    No interfaces have been configured as uplinks.
C.    The upstream switch is in NPV mode.
D.    The upstream vFC interface is disabled.
E.    VSAN mismatch on an uplink.

Answer: A

QUESTION 65
The L4-L7 Services were configured in the APIC, but you see this fault under service graph. Which action is the best way to resolve the problem?

 

A.    Delete the service graph and create it again
B.    Reimport the divide package
C.    Reset the NetScaler load balancer
D.    This is a configuration issue, Make sure that unicast routing is enabled on the bridge domain that is associated with the interfaces that are connected to the citric load balancer

Answer: D

QUESTION 66
Which three statements are true about redistribution of routes from L3Outs in an ACI Fabric? (Choose 3)

A.    Routes are not redistributed to leaf switches where the same VRF is present
B.    ACI fabric runs MP-BGP
C.    Security import subnets control the forwarding of packets into and out o L3Out connections(data planE.
D.    Routes learned from L3Outs on border leaf switches are not redistributed into MP-BGP at the ingress lead.
E.    Route control subnets control the exchange of routing information(Prefixes) into and out of the fibric (control place)

Answer: BCE

QUESTION 67
Which cisco UCS Director features enables you to view the REST API URL for every report display in cisco UCS Director?

A.    Orchestration features set
B.    REST API Brower
C.    Automation feature set
D.    Report metadata

Answer: D
Explanation:
The REST API call can be made in one of the following ways:
Cisco UCS Director GUI – Cisco UCS Director provides a developer menu option to offer the report metadata and REST API Browser for developers. To access these features, enable the developer menu. For more information about how to enable the developer menu, see Enabling the Developer Menu Options.
On enabling the developer menu, you gain access to the following features:
Report Metadata – The report Metadata enables you to view the REST API URL for every report displayed in Cisco UCS Director. For more information about how to access Report Metadata, see Accessing the Report Metadata.
REST API Browser – The REST API Browser is accessible from the Orchestration menu of Cisco UCS Director. The REST API Browser provides API information and API code generation capabilities that make it easy to see and work with all the available APIs, including both the REST APIs and the Java APIs. For more information about how to access REST API Browser, see Using the REST API Browser.
REST Client – The REST Client is a useful widget for parsing and viewing API requests and responses. In this widget, you can enter a REST URL and apply an HTTP method such as POST, PUT, or DELETE to the URL for data manipulation. The REST Client provides a simple user interface for entering a URL to fetch data from the Cisco UCS Director server.

QUESTION 68
Refer to the exhibit. Which outcome of this configuration is true?

 

A.    All traffic ceases to flow through this fabric interconnect after a reboot
B.    Servers ceases to use this fabric interconnect upon next reboot
C.    Any newly created traffic flows do not use this fabric interconnect
D.    All traffic ceases to flow through this fabric interconnect

Answer: D

QUESTION 69
Which three service request states are valid in cisco UCS director servce request execution state? (Choose 3)

A.    Failed
B.    Running
C.    Schedules
D.    Listening
E.    Debugging

Answer: ABC
Explanation:
Service Requests
Service Requests are closely related to workflows. You create service requests by running workflows; a service request is generated every time you execute a workflow in Cisco UCS Director. A service request is a process under the control of Cisco UCS Director.
A workflow can be scheduled for later execution, and details of completed service requests are stored by Cisco UCS Director. Thus a service request can have one of several states depending on its execution status: it can be scheduled, running, blocked (for example, awaiting an approval; see Approvals), completed, or failed (a service request can fail when one of its component tasks fails to execute properly; see Rollback and Resubmitting a Service Request).
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/ucs-director/orchestration-guide/5-4/b_UCS_Director_Orchestration_Guide_5_4/b_UCS_Director_Orchestration_Guide_5_4_chapter_011.html

QUESTION 70
Which three editing options of cisco UCS director workflow are valid? (Choose 3)

A.    Edit tasks in the workflow
B.    Change an input from mandatory to optional
C.    Reorder inputs
D.    Rename a workflow
E.    Delete inputs

Answer: ACD

QUESTION 71
Which three options are benefits of the vPC peers switch feature? (Choose 3)

A.    It eliminates the recommendation to pin the STP root to the vPC primary switch.
B.    It allows a pair of the vPC peer devices to appear as a single STP root in the Layer 2.
C.    After the peer link comes up, it performs an ARP bulk sync over CFSoE to the peer switch.
D.    It improves convergences for Layer 3 flows.
E.    It simplifies STP configuration by configuration both vPCs with the same STP priority.

Answer: ABE

QUESTION 72
Which protocol is best suited for wireless communication in an IoT deployment where sensors only have a power generating element (and do not have a battery)?

A.    Bluetooth
B.    ZigBee
C.    WIFI
D.    3G/4G

Answer: B
Explanation:
ZigBee is low-power allowing battery-operated devices such as door and window sensors to operate for seven years. With the Green Power feature, you don’t need any batteries!
http://www.zigbee.org/zigbee-for-developers/zigbee3-0/

QUESTION 73
Which 3 statements about nxapi_auth are true? (Choose 3)

A.    NX-API performs authentication through a programmable authentication module on the switch. Using cookies reduces the Number of PAM authentication, which reduces the load on the PAM.
B.    Use of nxapi_auth is optimal. This feature can be disabled to reduced authentication time and to support large number of API calls
C.    After the first successful authentication, the username and password are NOT include in subsequent NX-API request that are sent to the device,
D.    Expiration time of the nxapi-auth cookes can be changed up to the max of 1200 seconds
E.    The nxapi_auth cookies expires in 600 seconds
F.    After the first successful authentication , the username and password are used with the session cookie to bypass performing the full authentication process again

Answer: AEF
Explanation:
Security
NX-API supports HTTPS. All communication to the device is encrypted when you use HTTPS.
NX-API is integrated into the authentication system on the device. Users must have appropriate accounts to access the device through NX-API. NX-API uses HTTP basic authentication. All requests must contain the username and password in the HTTP header.
Note You should consider using HTTPS to secure your user’s login credentials.
You can enable NX-API by using the feature manager CLI command. NX-API is disabled by default.
NX-API provides a session-based cookie, nxapi_auth when users first successfully authenticate. With the session cookie, the username and password are included in all subsequent NX-API requests that are sent to the device. The username and password are used with the session cookie to bypass performing the full authentication process again. If the session cookie is not included with subsequent requests, another session cookie isrequired and is provided by the authentication process. Avoiding unnecessary use of the authentication process helps to reduce the workload on the device.
Note A nxapi_auth cookie expires in 600 seconds (10 minutes). This value is a fixed and cannot be adjusted.
NX-API performs authentication through a programmable authentication module (PAM) on the switch.
Use cookies to reduce the number of PAM authentications, which reduces the load on the PAM.

QUESTION 74
Which options list the contents of the NSH header in service chaining?

A.    base header, service path header, and context header
B.    network header, service header, and transport header
C.    Ethernet header, transport header, and application header
D.    Base header, transport header, and optional header

Answer: A

QUESTION 75
Which 2 statement about cisco UCS director API access key are true? (Choose 2)

A.    API access key is a shared secret that you must configure in Cisco UCS Director to enable REST API.
B.    API access key is a unique security access key code that is associated with a specific Cisco UCS Director user account
C.    API access key is unique for each API request
D.    API access key is required for Cisco UCS Director to authenticate API request

Answer: BD

QUESTION 76
Which 3 options are common PTP device types? (Choose 3)

A.    Crystal clock
B.    Ordinary clock
C.    Sundials
D.    Network clock
E.    Boundary clock
F.    Transparent clock

Answer: BEF

QUESTION 77
Refer to the exhibit. Which network script automation option or tool is used in the exhibit?

 

A.    Bach script
B.    Python
C.    NETCONF
D.    REST
E.    Cisco EEM

Answer: B

QUESTION 78
Which 3 benefits do VXLANs offer to VLANs? (Choose 3)

A.    It provide better utilization of available paths in the overlay infrastructure
B.    VXLAN uses a 24-bit VNID to overcome the 4094 vlan scale limitation
C.    VXLAN uses a 16-bit VNID to overcome the 4094 vlan scale limitation
D.    It provide a solution to extent layer 2 segment over a single layer 2 VLAN
E.    It provides a solution to extent layer 2 segments over a shared layer 3 routed network
F.    It provides better utilization of available network paths in the underlay infrastructure

Answer: BEF
Explanation:
VXLAN Overview
As its name indicates, VXLAN is designed to provide the same Ethernet Layer 2 network services as VLAN does today, but with greater extensibility and flexibility. Compared to VLAN, VXLAN offers the following benefits:
●   Flexible placement of multitenant segments throughout the data center: It provides a solution to extend Layer 2 segments over the underlying shared network infrastructure so that tenant workload can be placed across physical pods in the data center.
●   Higher scalability to address more Layer 2 segments: VLANs use a 12-bit VLAN ID to address Layer 2 segments, which results in limiting scalability of only 4094 VLANs. VXLAN uses a 24-bit segment ID known as the VXLAN network identifier (VNID), which enables up to 16 million VXLAN segments to coexist in the same administrative domain.
●   Better utilization of available network paths in the underlying infrastructure: VLAN uses the Spanning Tree Protocol for loop prevention, which ends up not using half of the network links in a network by blocking redundant paths. In contrast, VXLAN packets are transferred through the underlying network based on its Layer 3 header and can take complete advantage of Layer 3 routing, equal-cost multipath (ECMP) routing, and link aggregation protocols to use all available paths.
VXLAN Encapsulation and Packet Format
VXLAN is a Layer 2 overlay scheme over a Layer 3 network. It uses MAC Address-in-User Datagram Protocol (MAC-in-UDP) encapsulation to provide a means to extend Layer 2 segments across the data center network. VXLAN is a solution to support a flexible, large-scale multitenant environment over a shared common physical infrastructure. The transport protocol over the physical data center network is IP plus UDP.
http://www.cisco.com/c/en/us/products/collateral/switches/nexus-9000-series-switches/white-paper-c11-729383.html

QUESTION 79
According to cisco, which 2 options are benefits of ITD compared to WCCP? (Choose 2)

A.    Require less TCAM entries
B.    Transparent for service mode
C.    Much less configuration
D.    Does not require authentication or certificates
E.    Weighted load distribution

Answer: AE
Explanation:
https://supportforums.cisco.com/blog/12405286/itd-deploying-wae-devices-while-overcoming-deficiencies-wccp
 

QUESTION 80
Refer to the exhibit. Your application has reduced health score. Upon inspection, you find fault that impacts the health score. The fault currently is the soaking lifecycle state.
Which 2 options are possible next steps while in this state? (Choose 2)

 

A.    The condition ceases by itself and goes into the soaking- cleaning state
B.    The soaking timer expires and moves to the Raised severity level
C.    Acknowledge the fault, which immediately clears it from the system
D.    The condition ceases by itself and automatically clears the fault

Answer: AB

Lead2pass are committed on providing you with the latest and most accurate 400-151 exam dumps. Our 400-151 dump is rich in variety. We offer 400-151 PDF dumps and 400-151 VCE dumps. We ensure you can pass the 400-151 easily. Welcome to Lead2pass.com.

400-151 new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDQ0lSRmpvekFXeWs

2017 Cisco 400-151 exam dumps (All 372 Q&As) from Lead2pass:

https://www.lead2pass.com/400-151.html [100% Exam Pass Guaranteed]