200-150 Real Exam Dumps Questions and answers 1-10

Get Full Version of the Exam

Question No.1

Which three addresses are valid forms of an IPv6 Address: 2001:0DB8:0000:FE01:0000:0000:0000:0000? (Choose three.)

A. 2001:0DB8:0000:FE01:: B. 2001:DB8:0:FE01::

C. 2001:0DB8::FE01::

D. 2001:DB8:0:FE01:0:0:0:0

Correct Answer: ABD

Question No.2

Which VTP mode disallows the creation of local VLANs?

  1. transparent

  2. tunneling

  3. server

  4. client

  5. off

  6. native

Correct Answer: D


quot;A VTP client behaves like a VTP server and transmits and receives VTP updates on its trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on another switch in the domain that is in server mode.quot;

http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_52_se/configu ration/guide/swvtp.html#wp1205076

Question No.3

On a Cisco router, which configuration register setting bypasses the contents of the NVRAM?

A. 0x102 B. 0x2102 C. 0x2120 D. 0x2124 E. 0x2142

Correct Answer: E

Question No.4

For witch reason would you implement a VSAN?

  1. to overcome the limitation of zoing

  2. to virtualize storage

  3. to segment the physical fabric into multiple logical fabrics

  4. to overcome the limitations of LUN masking

Correct Answer: C

Question No.5

Which Cisco UCS power policy mode enables a configuration that can tolerate the loss of an input power circuit?

  1. nonredundatnt

  2. Grid

  3. N 1 in normal mode

  4. N 1 in high-density mode

Correct Answer: B


Grid Redundant (N N) – below: The purpose of the grid redundant mode is to enable a configuration that can tolerate the loss of either a power supply or a input power circuit. In grid- redundant mode the system can withstand the loss of any two power supplies. The Figure 5 shows the required wiringScheme for Grid Redundant power where N=2.

Question No.6

Refer to the exhibit. Which host can securely to the switch by using SSH?







Correct Answer: A

Question No.7

Which two descriptions of a Fabricpath network are true? (Choose two.)

  1. A leaf node connects to servers.

  2. Leaf nodes can be Layer 3 devices.

  3. A spine node connects to other switch in the fabric.

  4. There is a spanning tree protocol running between leaf and spine switches

  5. A spine node connects to servers.

Correct Answer: BD

Question No.8

Which two networking devices forward data based on destination MAC address? (Choose two.)

  1. Repeater

  2. Bridge

  3. Switch

  4. Router

  5. Hub

Correct Answer: BC

Explanation: http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11- 465436.html

Question No.9

What happens when there is no entry in the Layer 2 CAM table that corresponds to the destination MAC address of an incoming frame?

  1. The frame is flooded out of all forwarding ports in all VLANs.

  2. The frame is flooded out of all forwarding ports in its VLAN, except the port on which it is received.

  3. The switch drops the frame.

  4. The frame is flooded out of all forwarding ports in its VLAN, including the port on which it is received.

Correct Answer: B

Question No.10

Which two of the following statements are true with respect to STP in this network? (Choose 2)

  1. Both 5k#39;s have BPDU Guard and BPDU Filter enabled by default, while both 7k#39;s do not

  2. Both 5k#39;s bridge Assurance enabled, while both 7k#39;s do not

  3. 7k#39;s is the root bridge for VLANs 100-150

  4. Both 7K-3 and 7k-4 being vPC peers, are the root bridge for VLANs 100-150

  5. No devices have a root cost higher than 1, since all devices are no more that 1 hop away from each other

Correct Answer: BE

Get Full Version of 200-150 Dumps