刷题
导入试题
【多选题】
Which two features are commonly used CoPP and CPPr to protect the control plane? ___
A. QoS
B. traffic classification
C. access lists
D. policy maps
E. class maps
F. Cisco Express Forwarding
查看试卷,进入试卷练习
微信扫一扫,开始刷题
答案
AB
解析
暂无解析
相关试题
【多选题】
Which four tunne ling prot ocols are enabled in the Dfit GrpPolicy group policy ?___
A. Clientless SSL VPN
B. SSL VPN Client
C. PPTP
D. L2TP/IPsec
E. IPsec IKEv1
F. IPsec IKEv2
【多选题】
Which two statements regarding the aSA VPN configurations are correct?___
A. The asa has a certificate issued by an external certificate authority associated to the ASDM TrustPoint1
B. The Default WEBVPNGroup Connection Profile is using the aaa with RADIUS server method
C. The Inside-srvbook mark references the https://192.168.1.2url
D. Only Clientless SSL VPN access is allowed with the Sales group policy
E. Any Connect, IPSec IKEv1, and IPSec IKEv2 VPN access is enabled on the outside interface
F. The Inside -SRV bookmark has not been applied to the Sales group policy
【多选题】
Which three ESP fields can be encrypted during transmission?___
A. Security Parameter Index
B. Sequence Number
C. MAC Address
D. Padding
E. Pad length
F. Next Header
【多选题】
.Which three statements de scribe DHCP spoofing attacks?___
A. They can modify traffic in transit.
B. They are used to perform man- in-the-middle attacks
C. They use ARP poisoning
D. They can access most network devices
E. They protect the ide ntity of the attacker by masking the DHCP address.
F. They are can physically modify the network gateway.
【多选题】
Which statement about the communication between interfaces on the same security level is true?___
A. Interfaces on the same security level require additional configuration to permit interinterface communication
B. Configuring interfaces on the same security level can cause asymmetric routing
C. All traffic is allowed by default between interfaces on the same security level
D. You can configure only one interface on a n individual security level
【多选题】
In which two situations should you use in band management? ___
A. when the control plane fails to respond
B. when you require administrator access from multiple locations
C. when you require ROMMON access.
D. where a network device fails to forward packets
E. when multiple ma nagement applications need concument access to the device.
【多选题】
Which two features are supported in a VRF-aware softwar infrastructure before VRF-lite?___
A. multicast
B. fair queuing
C. WCCP
D.
E. IGRP
【多选题】
.Which loS command do you enter to test authentication again a AAA server?___
A. dialer aaa suffix <suffix> password <password>
B. ppp authentication chap pap test
C. test aaa-server authentication dialer group user name <user> password <password>
D. aaa authentication enable default test group tacases
【多选题】
Which two statements about the self zone on a cisco Xone based policy firewall are true?___
A. Multiple interfaces can be assigned to the self zone
B. it supports stateful inspections for multicast traffic
C. zone pairs that include the self zone apply to traffic transiting the device.
D. it can be either the source zone or the destination zone
E. traffic entering the self zone must match a rule
【多选题】
Which type of attack can exploit design flaws in the implementation of an application without ?___
A. DHCP starvation attacks
B. low-rate dos attacks
C. application DDos flood attacks
D. application DDoS flood attacks
E. volume-based DDoS attacks
【单选题】
Which type of firewall can server as the interme diary between a client and a server ?___
A. Stateless firewall
B. application firewall
C. proxy firewall
D. personal firewall
【单选题】
What is the highest security level that can be configured for an interface on an ASA?___
A. 0
B. 50
C. 10
D. 200
【单选题】
Which term refers to the electromagnetic interference that can radiate from network cables?___
A. Gaussian distributions
B. Doppler waves
C. emanations
D. multimode distortion
【单选题】
How does a zone pair handle traffic if the policy de fination of the zone pair is missing?___
A. It inspects all traffic.
B. It drops all traffic.
C. It permits all traffic wihtout logging
D. It permits and logs all traffic
【单选题】
default how does a zone based firewall handle traffic to add from the self zone?___
A. It permits all traffic without inspection
B. It inspects all traffic to determine how it is handled
C. It permits all traffic after inspection
D. It frops all traffic
【单选题】
Which command should beused to ena ble AAA Authentication to determine if a user can access the privilege command level?___
A. aaa authentication enable local
B. aaa authentication enable level=
C. aaa authentication enable method de fault
D. aaa authentication enable defa ult local
【单选题】
On an ASA, the policy indicates that traffic should not be translated is often referred to as which of the following?___
A. NAT zero
B. NAT forward
C. NAT nul
D. NAT allow
【单选题】
Which protocol offers data Integrity encryption, authentication, and anti-replay functions for IPSec VPN?___
A. ESP protocol
B. IKEv3 Protocol
C. AH protoco
D. IKEv1 Protocol
【单选题】
Which component offers a variety of security Solution, including firwall, IF Antivirus and antiphishing features?___
A. Cisco loS router
B. Cisco ASA 5500 Ser ies security appliance
C. Cisco ASA 5500 X series Next Gen Security appliance
D. Cisco 4200 series IPS appliance
【单选题】
Refer to the exhibit, A Network Secur ity administrator check the ASa firewall NAT policy table rith show nat command, which statement is fails?___
A. There are only reverse translation matches for the REAL SERvER object
B. First policy in the Section 1 is a dynamic nat entry defined in the object configuration
C. NAT policy in section 2 is static entry de fined in the object configuration
D. Translation in Section 3 used when a connection does not matches any entries in first two sections
【单选题】
What is true of an aSa in transparent mode ?___
A. It supports OSPF
B. It requires an IP address for each interface
C. It requires a management IP address
D. It allows the use of dynamic NaT
【单选题】
What is the effect of the ip scp server enable command?___
A. It references an access list that allows specific SCP servers
B. It allows the router to initiate requests to an SCP server
C. It allows the router to become an SCP server
D. It adds SCP to the list of allowed copy functions
【单选题】
How can you mitigate attacks in which the attacker attaches more than one vLan tag to a packet?___
A. Assign an access VLAN to every active port on the switch
B. Disable Ether Channel on the switch
C. Explicitly identity each VLAN allowed across the trunk
D.
E. nable transparent VTP on the switch
【单选题】
Which technology can you implement to centrally mitigate potential threats when users on your network download files that might be malicious?___
A. Enable file-reputation services to inspect all files that traverse the company network and block files with low reputation scores
B. Verify that the compa ny IpS blocks all known malicious website
C. Verity that antivirus software is installed and up to date for all users on your network
D. Implement URL filtering on the perimeter firewall
【单选题】
What is the most common implementation of PaT in a standard networked environment?___
A. configuring multiple external hosts to join the self zo ne and to communicate with one another
B. configuring multiple internal hosts to communicate outside of the network using the outside interface IP address
C. configuring multiple internal hosts to communicate outside of the network by using the inside interface IP address
D. configuring an any any rule to enable external hosts to communicate inside the network
【单选题】
Which component of a bYod architecture provides aAa services for endpoint access ?___
A. Integrated Services Router
B. access point
C. ASA
D. Identity Services
E. ngine
【单选题】
You are configuring a NAT rule on a Cisco ASA ,Which description of a mapped interface is true?___
A. It is mandatory for all firewall modes
B. It is optional in routed mode
C. It is optional in transparent mode
D. It is mandatory for ide ntity NAT only
【单选题】
Which description of the use of a private key is true ?___
A. The sender signs a message using the receivers private key
B. The sender signs a message using their private key
C. The sender encrypts a message using the receivers private key
D. The receiver decrypts a n15ssage using the sender's private key
【单选题】
Which mechanism does the FireAMP Connector use to avoid conflicts with other security applications such as antivirus products ?___
A. Virtualization
B. Containers
C. Sandboxing
D.
E. xclusions
【单选题】
Which network to pology de scribes multiple LANS in a gec? ___
A. SOHO
B. MAN
C. pan
D. CAN
【单选题】
Which statement represents a difference between an access list on an aSa versus an access list on a router?___
A. The asa does not support number access lists
B. The aSa does not support standard access list
C. The asa does not ever use a wildcard mask
D. The asa does not support extended access lists
【单选题】
Which command do you enter to verify the status and settings of an iKE Phase 1 tunnel?___
A. show crypto ipsec as output
B. show crypto isakmp
C. show crypto isakmp policy
D. show crypto ipsec transform
【单选题】
Which feature can help a router or switch maintain packet forwarding and protocol states despite an attack or heavy traffic load on the router or switch?___
A. service Policy
B. Control Plane Policing
C. Policy Map
D. Cisco
E. xpress
F. orwarding
【单选题】
Which STP feature can prevent an attacker from becoming the root bridge by immediately shutting down the interface when it receives a BPDU?___
A. root guard
B. Port Fast
C. BPDU guard
D. BPDU filtering
【单选题】
Which technology can best protect data at rest on a user system?___
A. full-disk encryption
B. IPsec tunnel
C. router ACL
D. network IPS
【多选题】
Which two primary security concerns can you mitigate with a BYOD solution ?___
A. schedule for patching the device
B. securing access to a trusted corporate network
C. compliance with applicable policies
D. connections to public Wi-Fi networks
E. device tagging and invento
【多选题】
choose five___
A. MD5————————inserure
B. DES————————insercure
C. SDES———————legacy
D. SHA-1———————legacy
E. HMAC-MD5—————legacy
【多选题】
Which two characteristics of symmetric encryption are true?___
A. It uses digital certificates
B. It requires more resources than asymmetric ancryption
C. It uses the same key to enctypt and decrupt traffic
D. It uses a public key and a pricate key to encrypt and decrypt traffic.
E. It is faster than asymmetric encryption
【多选题】
which two characteristics of PVLAN are true?___
A. Promiscuous porta can communicate with PVLAN ports.
B. Isolated ports cannot communicate with other ports on the same VLAN
C. Community ports have to be a part of the trunk.
D. They require VTP to be enabled in server mode
E. PVLAN ports can be configured as Ether Channel ports
【多选题】
What are two options for running Cisco SDM?___
A. Running SDM from a mobile device
B. Running SDM from within CiscoWorks
C. Running SDM from a router's flash
D. Running SDM from the Cisco web porta
E. Running SDM from a PC
推荐试题
【多选题】
Which two storage controller configurations can be used with Virtual SAN? (Choose two.)___
A. SAS controllers in Passthrough mode
B. SAS controllers in RAID0 mode
C. SAS controllers in RAID1 mode
D. SAS controllers in RAID10 mode
【多选题】
Which three are requirements when using vMotion to move a virtual machine across vCenter Server systems? (Choose three.)___
A. Both vCenter Servers must be using Enhanced Linked Mode.
B. Both vCenter Servers must be in the same Single Sign-On Domain.
C. Time must be synchronized.
D. Duplicate VM MAC addresses must be configured.
E. Both vCenter Servers must have High Availability enabled on source and destination clusters.
【多选题】
Which two components can be used when configuring Enhanced Linked Mode? (Choose two.)___
A. vCenter Server Appliance
B. vRealize Operations Manager
C. vSphere Management Appliance
D. vCenter Server for Windows
【多选题】
An organization has a number of virtual machines that would benefit from Fault Tolerance. These include: <A single vCPU Apache Server> < A dual vCPU vCenter Server> < A quad vCPU SQL Server> <An eight vCPU Hadoop Server>. Which two virtual machines can be configured to use VMware Fault Tolerance? (Choose two.)___
A. Apache Server
B. vCenter Server
C. SQL Server
D. Hadoop Server
【多选题】
Which two badges are major badges in vRealize Operations? (Choose two.)___
A. Risk
B. Efficency
C. Workload
D. Faults
【多选题】
An administrator is deploying multiple Windows 2003 Virtual Machines from the same template. What two steps should be taken to avoid network conflicts? (Choose two.)___
A. Customize the guest operating system.
B. Install VMware Tools into the new virtual machines.
C. Copy the Microsoft Sysprep tools onto the vCenter Server system.
D. Ensure the e1000 vmnic is selected for each new virtual machine.
【多选题】
Which three conditions would prevent Storage I/O Control from being enabled on a group of datastores? (Choose three.)___
A. The datastores planned for the solution are used by different vSphere clusters.
B. A datastore planned for the solution is configured as a Raw Device Mapping file.
C. A datastore planned for the solution has three extents.
D. A datastore planned for the solution is configured as NFS.
E. The organization has an Enterprise license.
【多选题】
Which two actions are prerequisites to adding ESXi 6.x hosts to a vSphere Distributed Switch? (Choose two.)___
A. Verify that there is at least one Distributed Port Group on the Distributed Switch.
B. Verify that the Distributed Port Group have active uplinks configured in its teaming and failover policy.
C. Verify that the
D. istributed Switch has been configured with a Network Profile.
【多选题】
An organization has configured Distributed Power Management (DPM) on a vSphere 6 cluster. The organization wants to be alerted when an ESXi host has been powered down by DPM. Which two options represent the type and name of the alarm that would accomplish this? (Choose two.)___
A. DrsEnteringStandbyModeEvent
B. DrsEnteredStandbyModeEvent
C. Event-based
D. Condition-based
【多选题】
Which two allow for the disabling of Network Rollback operations? (Choose two.)___
A. Modifying the vpxd advanded configuration options and adding the config.vpxd.network.rollback key
B. Modifying the C:\ProgramData\VMware\CIS\cfg\vmware-vpx\vpxd.cfg file and adjusting the<rollback> xml tag
C. Modifying the C:\ProgramData\VMware\CIS\cfg\vmware-vpx\vpxd.cfg file and adjusting the <networkrollback> xml tag
D. Modifying the C:\ProgramData\VMware\CIS\cfg\vmware-vpx\firstboot\vpxd-service- spec.prop file and adjusting the <rollback> xml tag
【多选题】
An administrator is tasked with performing a vMotion migration of a virtual machine. The virtual machine is configured as follows: <vSphere Flash Read Cache (vFRC) enabled> <Is part of a Distributed Resource Cluster (DRS) Cluster> Which two statements are true? (Choose two.)___
A. Each ESXi host in the cluster supports multiple virtual flash resources.
B. Each ESXi host in the cluster supports one virtual flash resource.
C. DRS treats powered-on virtual machines with Flash Read Cache as having a preferred affinity to their current host and moves them only for mandatory reasons.
D. DRS treats powered-on virtual machines with Flash Read Cache as having a required affinity to their current host and does not move them.
【多选题】
An administrator is using the Host Failures to Tolerate Admission Control Policy for a vSphere High Availability ___ cluster. When configuring this setting on the cluster, the administrator sees this error message: <Insufficient resources to satisfy HA failover level on cluster > What are two likely causes for the error? (Choose two.)(AB)
A. The hosts in the cluster are disconnected.
B. A host in the cluster is displaying an HA error.
C.
D. istributed Resource Scheduler has not been configured on the cluster.
【多选题】
What are two ways to identify TCP/IP stack information? (Choose two.)___
A. Using the vSphere Web Client
B. Using esxcli network ip netstack
C. Using esxcfg-netstack
D. Using the vSphere Client
【多选题】
Which two actions are required when enabling vFlash Read Cache for a virtual machine's virtual disk? (Choose two.)___
A. A value in the Virtual Flash Read Cache text box must be entered.
B. A Flash Resource Pool for Cache size reservation must be entered.
C. The Device backing and the block size must be configured.
D. The
E. nable virtual flash host swap cache check box must be selected.
【多选题】
What two IT infrastructure components are virtualized by vSphere Essentials? (Choose two.)___
A. Networks
B. Applications
C. Storage
D. Management
【多选题】
When attempting to access a virtual machine, an administrator is unable to login using the vSphere credentials. What two options are probable causes of the authentication failure? (Choose two.)___
A. The vSphere credentials have not been granted permissions.
B. The vSphere credentials are granted read-only permissions.
C. The vSphere credentials are granted no-access permissions.
D. The vSphere credentials are not a member of the local administrator group.
【多选题】
An administrator is performing a scripted installation of ESXi 6.x. In which three locations does the script need to be? (Choose three.)___
A. PXE Server
B. HTTPS
C. FTP
D. NFS
E. VVOLs Datastore
【多选题】
In order for a company to meet regulatory requirements, all ESXi 6.x Hosts must be configured to direct logs to a syslog server. What are two ways ESXi hosts can configured for this action? (Choose two)___
A. Use the esxcli system syslog command.
B. Edit them in the ESXi host Advanced System Settings.
C. From the Syslog collector user interface of the Web Client.
D. Syslog logging is not available for
E. SXi Hosts.
【多选题】
Which three actions can be executed when an alarm is triggered? (Choose three.)___
A. Send an email.
B. Send an SNMP trap.
C. Run a script or command.
D. Run an Orchestrator workflow.
E. Send a trigger to syslog.
【多选题】
An administrator is attempting to power on a virtual machine, but is unable to do so. Which two reasons are probable causes of the failure? (Choose two.)___
A. Storage access to the virtual machine swap file has been lost.
B. One of the virtual machine VMDK files is locked.
C. Virtual machine is running CentOS 7.0 64-bit.
D. Virtual machine has Hyper-Threading enabled.
【多选题】
An administrator has configured a host profile so that ESXi 6.x hosts will point to the corporate NTP server for time synchronization. The NTP server is located at 10.0.30.213, but time has not been synchronized properly across the ESXi hosts. The administrator reviews Host Profile settings as shown in the Exhibit. Which two steps are required to resolve the issue? (Choose two.)___
A. Correct the NTP server IP address.
B. Check the host for host profile compliance.
C. Remediate the host based on the updated host profile.
D. Change the NTP server to the FQDN as IP Addresses are not supported.
【多选题】
An administrator is attempting to migrate a large Hadoop virtual machine using vMotion. The administrator notices a delay when the machine is quiesced. The Hadoop virtual machine is processing many transactions a second to an in-memory database. Which two actions would help reduce the amount of time needed to perform a vMotion on this virtual machine? (Choose two.)___
A. Use multiple NICs for the vMotion vmkernel port.
B. Use a 10Gbps Network card for the vMotion vmkernel port.
C. Add an additional management network to help transmit the data quicker.
D. Disable Fault Tolerance before performing the vMotion.
【多选题】
An administrator is installing a new network card in an ESXi 6.x host that is part of a vSphere cluster. When the host is placed into maintenance mode, the vSphere Web Client displays the progress bar at 2% for over 30 minutes. Which two are likely reasons for this occurrence? (Choose two.)___
A. Maintenance mode is unable to migrate all virtual machines from the host.
B. There is a large number of virtual machines that must be migrated from the host.
C. VMware High Availability is in the process of reconfiguring the cluster.
D. Each virtual machine on the
E. SXi host must be reconfigured to recognize the new adapter.
【多选题】
Which two events happen when Distributed Resource Scheduler (DRS) is disabled? (Choose two.)___
A. The cluster's resource pool heirarchy and affinity rules are re-established when DRS is turned back on.
B. The cluster's resource pool hierarchy and affinity rules are not re-established when DRS is turned back on.
C. The cluster's resource pools are removed from the cluster.
D. The cluster's resource pools are removed from the cluster and assigned to the hosts.
【多选题】
Which two networking connection types can be configured on a virtual switch? (Choose two.)___
A. Virtual machine portgroups
B. VMkernel services (such as NFS, iSCSI, or vMotion) to the physical network
C. Web services over the Management Network
D. NFS and FCoE storage services
【多选题】
An administrator creates a DRS cluster of eight ESXi 6.x hosts. There are 10 virtual machines balanced across the hosts. An attempt to place the first host into maintenance mode fails. What are two reasons that the host failed to enter maintenance mode? (Choose two.)___
A. The DRS cluster Automation Level is set to Partially Automated mode.
B. One of the virtual machines on the ESXi Host entering maintenance mode is configured with a DRS Host affinity rule Should run on hosts in group.
C. One of the virtual machines on the ESXi Host entering maintenance mode is configured with a DRS Host affinity rule Must run on hosts in group.
D. One of the virtual machines on the
E. SXi Host entering maintenance mode is configured with an individual Automation Level set to Partially Automated.
【多选题】
When modifying a vApp, which two vSphere entities can be added? (Choose two.)___
A. A resource pool
B. A network pool
C. A vApp
D. A folder
【多选题】
From which two locations in the inventory hierarchy can you deploy a virtual machine using a template? (Choose two.)___
A. Directly from the template.
B. From a compute resource.
C. From an existing virtual machine.
D. From a Datastore.
【多选题】
A company has decided to implement Virtual SAN within their vSphere 6.x environment. The Virtual SAN cluster will be composed of three ESXi 6.x hosts that are on the Virtual SAN Ready Node list. Each ESXi host includes: <Two SAS Controllers that support Passthrough Mode> < Four Solid State Drives (SSDs) 1TB in size each> <20 SAS Magnetic Disks (MDs) 1TB in size each> <The SSDs and MDs are evenly split between the two SAS controllers>. The company will pilot a Virtual SAN cluster utilizing VMware best practices while maximizing storage capacity. The Virtual SAN cluster will use Manual Mode. Which two Disk Group configurations would meet the stated configuration requirements? (Choose two.)___
A. 4 disk groups with 1 SSD and 5 MDs each
B. 2 disk groups with 1 SSD and 7 MDs each
C. 2 disk groups with 2 SSDs and 7 MDs each
D. 2 disk groups with 1 SSD and 10 MDs each
【多选题】
A physical Windows 2008 R2 Server is converted to a virtual machine using VMware vCenter Converter. Upon completion of the conversion and subsequent power on operation, the virtual machine fails to boot and the message below is observed in the Console of the virtual machine: <STOP 0x0000007B INACCESSIBLE_BOOT_DEVICE>. Which two potential issues may be causing this boot failure? (Choose two.)___
A. An incorrect SCSI controller was selected during conversion.
B. Incompatible software drivers were migrated into the virtual machine from the source machine.
C. The vmdk file backing the virtual machine was thick provisioned.
D. A snapshot was taken immediately after the conversion completed.
【多选题】
An administrator is configuring the Failover Order option on a vSphere Distributed Switch. Which two options should be used with IP-hash load balancing? (Choose two.)___
A. Active Uplinks
B. Standby Uplinks
C. Unused Uplinks
D. Override Failover Order
【多选题】
An administrator is configuring the Maximum Transmission Unit value on a vSphere Distributed Switch. Which two options are typical values for ESXi networking? (Choose two.)___
A. 1492
B. 1500
C. 9000
D. 9089
【多选题】
Which two configurable options apply to both virtual machine CPU and memory allocation? (Choose two.)___
A. Reservation
B. Shares
C. Resource Pool
D. Reserve All
【多选题】
When attempting to power on a Virtual Machine you observe the following error: <Cannot open the disk '/vmfs/volumes/volume/vm/vm-000002.vmdk' or one of the snapshot disks it depends on.> Which three actions will be the best solutions to address this problem? (Choose three.)___
A. Verify that the virtual machine's disk files are present.
B. Investigate the host and virtual machine log files.
C. Verify the vmdk descriptor files and if required, recreate them.
D. Delete the disk file preventing the power on operation.
E. Migrate or register the virtual machine to a different host.
【多选题】
An administrator has been tasked with enabling High Availability ___ on a cluster in a vSphere 6.x environment with default settings. The cluster configures properly and there are no errors. The next day when powering on a virtual machine, an error is presented: <Not Enough Failover Resources>. Which three scenarios are likely causes of this error message? (Choose three.)(CDE)
A. The default VM Monitoring Sensitivity is set too high.
B. There are not enough datastore heartbeat datastores configured by default.
C. The default slot size in the cluster is set too high.
D. There are virtual machines with large CPU reservations.
E. A host is in maintenance mode for a replacement of a failed Hard Drive.
【多选题】
vMotion can be performed between which three physical boundaries? (Choose three.)___
A. Between two vCenter Server Systems
B. Between two vSphere Distributed Virtual Switches
C. Between two vCenter Server Datacenter objects
D. Between two VMware NSX Layer 4 segments
E. Between two NFS datastores
【多选题】
An administrator configures vSphere Replication for a virtual machine and enables multiple point in time (PIT) instances under the recovery settings in the Configure Replication wizard. Which two statements are correct for vSphere Replication with multiple point in time instances enabled? (Choose two.)___
A. vSphere Replication retains a number of snapshot instances of the virtual machine on the target site based on the retention policy that you specify.
B. vSphere Replication uses the virtual machine's snapshot instances to define the target site Point in Time instance based on the retention policy that you specify.
C. vSphere Replication does not support virtual machines with snapshots.
D. vSphere Replication supports virtual machines with snapshots.
【多选题】
An administrator is virtualizing a physical application server and adding it to an existing multi-tiered vApp. The application license is currently tied to the physical NIC's MAC address, so the administrator needs to ensure the license will function properly in the virtual machine. Which two actions can the administrator take to satisfy this task? (Choose two.)___
A. Set the MAC address for the vNIC in the guest operating system.
B. Install the physical server's NIC into the ESXi host.
C. Configure the MAC address for the vNIC using the vSphere Web Client.
D. Assign the physical server NIC's MAC address in the vSphere Distributed Switch.
【多选题】
Which two Fibre Channel zoning options are supported with vSphere 6.x? (Choose two.)___
A. Single-Initiator
B. Single-Initiator-Single-Target
C. Multiple-Initiators-Single-Target
D. Multiple-Initiators-Multiple-Targets
【多选题】
An administrator is attempting to remove an ESXi 6.x host from a vSphere Distributed Switch (vDS). When the administrator attempts to remove the host, the following error is observed: <The resource '16' is still in use.> What three steps are needed to successfully remove the host from the switch? (Choose three.)___
A. Select Manage Ports on the vDS for the host.
B. Locate all ports currently in use on the vDS for the host.
C. Migrate or delete any vmkernel or virtual machine adapters associated with the switch.
D. Remove all network cards from the switch before trying to remove the host.
E. Create a standard switch for everything to be automatically be migrated to.
欢迎使用我爱刷题
×
微信搜索我爱刷题小程序
温馨提示
×
请在电脑上登陆“www.woaishuati.com”使用