Which of the following tools would you use to view SCSI error count statistics?
Which of the following tools would you use to view SCSI error count statistics?
Which two of these routing protocols can be configured using SDM?
The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)
What is the prerequisite for accessibility, when a customer has a Cisco MDS 92222i switch deployed in two diff
What is the prerequisite for accessibility, when a customer has a Cisco MDS 92222i switch deployed in two different locations with the mgmt0 port located in the management VLAN? Select the best response.
Which of these switch port types should the port be set to?
You have been asked to configure a port on your Cisco MDS switch so that a host can join your
fabric. Which of these switch port types should the port be set to?
Which three of these features are supported on the Cisco VPN software client release 4.0.5?
Which three of these features are supported on the Cisco VPN software client release 4.0.5? (Choose three.)
Which component of the Cisco MDS 9509 director switch can fail and the switch will continue to run without dow
Which component of the Cisco MDS 9509 director switch can fail and the switch will continue to run without downtime? Select the best response.
What happens when the administrator of Switch B attempts to activate ZoneSet2?
Your company has a multiswitch fabric including Switch A and Switch B. An administrator of
Switch A creates the following zone set and successfully activates
it:
zoneset name ZoneSetl vsan 1
zone name Zonel vsan 1
pwwn 21:01:00:e0:8b:3c:03:b6
pwwn 21:01:00:e0:8b:3c:55:bb
Later in the day, a second administrator creates the following zone set on Switch B: zoneset name
ZoneSet2 vsan 1 zone name Zonel vsan 1 pwwn 21:01:00:e0:8b:3c:03:b6 pwwn
21:01:00:e0:8b:3c:55:aa
What happens when the administrator of Switch B attempts to activate ZoneSet2?
List three benefits of implementing an integrated security solution based on the Cisco Self-Defending Network
List three benefits of implementing an integrated security solution based on the Cisco Self-Defending Network strategy? (Choose three.)
What should be done to secure the data immediately?
An organization has just realized that the data stored on disk array servers is accessible to unauthorized users. What should be done to secure the data immediately? Select the best response.
a previously saved configuration file?
Which of these Cisco Fabric Manager debugging tools can compare the current configuration with
a previously saved configuration file?