getcertified4sure.com

Cisco 642-997 Free Practice Questions 2021




Your success in 642 997 dumps is our sole target and we develop all our 642 997 dumps in a way that facilitates the attainment of this target. Not only is our 642 997 dumps material the best you can find, it is also the most detailed and the most updated. 642 997 dumps for Cisco 642-997 are written to the highest standards of technical accuracy.

Online Cisco 642-997 free dumps demo Below:

NEW QUESTION 1
Which example creates an Embedded Event Manager policy allowing the CLI command to execute, and triggers an SNMP notification when a user enters configuration mode?
A)
642-997 dumps exhibit
B)
642-997 dumps exhibit
C)
642-997 dumps exhibit
D)
642-997 dumps exhibit

  • A. Option A
  • B. Option B
  • C. Option C
  • D. Option D

Answer: A

NEW QUESTION 2
Which two security features are only supported on the Cisco Nexus 7000 Series Switches? (Choose two.)

  • A. IP source guard
  • B. traffic storm control
  • C. CoPP
  • D. DHCP snooping
  • E. Dynamic ARP Inspection
  • F. NAC

Answer: BF

Explanation: A traffic storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. You can use the traffic storm control feature to prevent disruptions on Layer 2 ports by a broadcast, multicast, or unicast traffic storm on physical interfaces. Traffic storm control (also called traffic suppression) allows you to monitor the levels of the incoming broadcast, multicast, and unicast traffic over a 10-millisecond interval. During this interval, the traffic level, which is a percentage of the total available bandwidth of the port, is compared with the traffic storm control level that you configured. When the ingress traffic reaches the traffic storm control level that is configured on the port, traffic storm control drops the traffic until the interval ends.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/dcnm/security/configurati on/guide/b_Cisco_DCNM_Security_Configuration_Guide Release_5- x/Cisco_DCNM_Security_Configuration_Guide Release_5-x_chapter17.html
And
http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/5_x/dcnm/security/configuration/guide/b_Cisco_DCNM_Security_Configuration_Guide Release_5- x/Cisco_DCNM_Security_Configuration_Guide Release_5-x_chapter1.html

NEW QUESTION 3
Which three basic parameters of operation does the RBAC feature provide? (Choose three.)

  • A. Command
  • B. Feature
  • C. Feature Group
  • D. Modify default user role

Answer: ABC

NEW QUESTION 4
Which two options are limitations of NetFlow Version 5? (Choose two.)

  • A. no support for IPv6, Layer 2, or MPLS fields
  • B. fixed field specifications
  • C. excessive network utilization
  • D. analyzes all packets on the interface

Answer: AB

NEW QUESTION 5
Which command sequence correctly enables Adapter FEX on Nexus 5000 Series Switches?

  • A. switch(config)# install feature-set virtualization switch(config)# feature-set virtualization
  • B. switch(config)# install feature-set adapter-fex switch(config)# feature-set adapter-fex
  • C. switch(config)# install feature-set adapter-fex switch(config)# feature-set virtualization
  • D. switch(config)# install feature-set virtualization switch(config)# feature-set adapter-fex

Answer: A

Explanation: install feature-set virtualization : installs the cisco virtual machine feature set on the switch. feature-set virtualization : enables the cisco virtual machine feature on the switch.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/adapter-fex/513_n1_1/b_Configuring_Cisco_Nexus_5000_Series_Adapter- FEX_rel_5_1_3_N1/b_Configuring_Cisco_Nexus_5000_Series_Adapter- FEX_rel_5_1_3_N1_chapter_010.pdf

NEW QUESTION 6
How is a dynamic vNIC allocated?

  • A. Dynamic vNICs are assigned to VMs in vCenter.
  • B. Dynamic vNICs can only be bound to the service profile through an updating template.
  • C. Dynamic vNICs are bound directly to a service profile.
  • D. Dynamic vNICs are assigned by binding a port profile to the service profile.

Answer: C

Explanation: The dynamic vNIC connection policy determines how the connectivity between VMs and dynamic vNICs is configured. This policy is required for Cisco UCS domains that include servers with VIC adapters on which you have installed VMs and configured dynamic vNICs. Each dynamic vNIC connection policy includes an Ethernet adapter policy and designates the number of vNICs that can be configured for any server associated with a service profile that includes the policy.
For VM-FEX that has all ports on a blade in standard mode, you need to use the VMware adapter policy.
For VM-FEX that has at least one port on a blade in high-performance mode, use the VMwarePassThrough adapter policy or create a custom policy. If you need to create a custom policy, the resources provisioned need to equal the resource requirements of the guest OS that needs the most resources and for which you will be using high-performance mode.
Reference: http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/vm_fex/vmware/gui/config
_guide/b_GUI_VMware_VM-FEX_UCSM_Configuration_Guide/b_GUI_VMware_VM- FEX_UCSM_Configuration_Guide_chapter_010.html

Topic 3, Manage the Unified Fabric in a Cisco Data Center Architecture

NEW QUESTION 7
Which Cisco NX-OS feature allows transparent Layer 2 extension between sites?

  • A. FabricPath
  • B. ETV
  • C. OTV
  • D. vPC
  • E. LISP
  • F. TrustSec

Answer: C

NEW QUESTION 8
What is the Overlay Transport Virtualization site VLAN used for?

  • A. to allow the join interfaces at different sites to communicate
  • B. to detect devices at the site that are not capable of OTV
  • C. to allow multiple site AEDs to communicate with each other
  • D. to detect other OTV edge devices in the site

Answer: D

Explanation: The edge device performs OTV functions: it receives the Layer 2 traffic for all VLANs that need to be extended to remote locations and dynamically encapsulates the Ethernet frames into IP packets that are then sent across the transport infrastructure. It is expected that at least two OTV edge devices are deployed at each data center site to improve the resiliency.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/whitepaper/DC I3_OTV_Intro/DCI_1.html

NEW QUESTION 9
Which three options are CallHome predefined destination profiles that are supported on Cisco NX-OS? (Choose three.)

  • A. CiscoTAC-1
  • B. full-text-destination
  • C. pager-xml-destination
  • D. short-text-destination
  • E. xml-text-destination
  • F. pager-json-destination

Answer: ABD

NEW QUESTION 10
The Connectivity Management Processor monitors the active supervisor module on a Cisco Nexus 7000 switch and will reboot the device in the event of a lights-out management issue. However, which option includes features that provide similar benefits in the absence of the Connectivity Management Processor?

  • A. high-availability functionality from features such as vPC and NSF
  • B. traditional system connectivity models like SNMP, GUI, or SSH
  • C. Cisco FabricPath
  • D. VDC failover

Answer: A

Explanation: vPC uses the vPC peer-keepalive link to run hello messages that are used to detect a dual- active scenario. A Gigabit Ethernet port can be used to carry the peer-keepalive messages. A dedicated VRF is recommended to isolate these control messages from common data packets. When an out-of-band network infrastructure is present, the management interfaces of the Cisco Nexus 7000 supervisor could be also used to carry keep-alive connectivity using the dedicated management VRF. When the vPC peer-link is no longer detected, a dual-active situation occurs, and the system disables all vPC port channel member on the "secondary" vPC peer (lower vPC role priority value). Also SVI interfaces
associated to a vPC VLAN are suspended on the secondary switch. As a result, in this condition only the “primary” vPC peer actively forwards traffic on the vPC VLANs. Multiple peer-keepalive links can be used to increase resiliency of the dual-active detection mechanism.
Both the Cisco Catalyst 6500 and the Cisco Nexus 7000 offer a variety of high-availability features. Some of the primary features to highlight are In Service Software Upgrade (ISSU), Stateful Switchover (SSO), and Nonstop Forwarding (NSF). The operation and the behavior of these features are unique to the respective platform and can be independently executed without affecting the interoperability between the two platforms.
Reference: http://www.cisco.com/c/en/us/products/collateral/switches/catalyst-6500-series-switches/white_paper_c11_589890.html

NEW QUESTION 11
Which feature must be enabled for Cisco TrustSec FC Link Encryption to work on a Cisco MDS 9000 Series Switch?

  • A. crypto IKE
  • B. port security
  • C. LDAP
  • D. FC-SP

Answer: D

NEW QUESTION 12
DRAG DROP
Drag the description on the left to the most appropriate FCoE protocol or feature on the right.
642-997 dumps exhibit

    Answer:

    Explanation: ENODES: During FLOGI or FDISC, the ENode advertises the addressing modes it supports. If the FC switch supports an addressing mode that the ENode uses, the virtual link can be established, and the devices can communicate.
    FIP: FIP is the set of control plane functions that enable discovery of FCoE-capable devices across FCoE passthrough switches and establishment of legal combinations of virtual links.
    FCF: FCoE Initialization Protocol (FIP) is the FCoE control protocol responsible for establishing and maintaining Fibre Channel virtual links between pairs of FCoE devices (ENodes or FCFs). During the virtual link establishment phase, FIP first discovers FCoE VLANs and remote virtual FC interfaces; then it performs virtual link initialization functions (fabric login [FLOGI] and fabric discovery [FDISC], or exchange link parameters [ELP]) similar to their native Fibre Channel equivalents. After the virtual link is established, Fibre Channel payloads can be exchanged on the virtual link, and FIP remains in the background to perform virtual link maintenance functions; it continuously verifies reachability between the two virtual FC interfaces on the Ethernet network, and it offers primitives to delete the virtual link in response to administrative actions to that effect. This document does not describe the virtual link maintenance functions of FIP.

    NEW QUESTION 13
    What is the Overlay Transport Virtualization site VLAN used for?

    • A. to allow the join interfaces at different sites to communicate
    • B. to detect devices at the site that are not capable of OTV
    • C. to allow multiple site AEDs to communicate with each other
    • D. to detect other OTV edge devices in the site

    Answer: D

    NEW QUESTION 14
    Which of the following Cisco Nexus features is best managed with DCNM-LAN?

    • A. VSS
    • B. Domain parameters
    • C. Virtual switches
    • D. AAA

    Answer: C

    Explanation: DCNM-LAN supports the following platforms:
    642-997 dumps exhibitCisco Nexus 1000V switches
    642-997 dumps exhibitCisco Nexus 2000 Fabric Extenders
    •Cisco Nexus 3000 Series switches
    642-997 dumps exhibit•Cisco Nexus 4000 Series switches
    •Cisco Nexus 5000 Series switches
    642-997 dumps exhibitCatalyst 6500
    642-997 dumps exhibitDCNM-LAN provides limited support for the Catalyst 6500 Series switches that runs classic IOS version 12.2(33)SXI or higher.
    –DCNM-LAN supports the viewing of the current configuration attributes of the device.
    –DCNM-LAN does not support changing the configuration of the device.
    –DCNM-LAN supports the Firewall Service Module (FWSM) version 4.0 or higher for the Catalyst 6500 Series switches.
    •Cisco Nexus 7000 Series switches
    Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/mds9000/sw/5_2/configuration/g
    Cisco Data Center Architecture

    NEW QUESTION 15
    Which statement about scalability in Cisco OTV is true?

    • A. The control plane avoids flooding by exchanging MAC reachability.
    • B. IP-based functionality provides Layer 3 extension over any transport.
    • C. Any encapsulation overhead is avoided by using IS-IS.
    • D. Unknown unicasts are handled by the authoritative edge device.

    Answer: A

    Explanation: Cisco calls the underlying concept of OTV traffic forwarding "MAC routing", since it behaves as if you are routing Ethernet frames over the DCI transport. OTV uses a control plane protocol to proactively propagate MAC address reachability before traffic is allowed to pass, which eliminates dependency on flooding mechanism to either learn MAC addresses or forward unknown unicasts.
    Reference: http://www.computerworld.com/article/2515468/data-center/layer-2-data-center-interconnect-options.html

    NEW QUESTION 16
    Which two statements about Cisco DCNM licenses are true? (Choose two.)

    • A. The licenses are applied to bootflash of the Cisco Network devices
    • B. The licenses are applied to the network device serial numbers
    • C. The licenses are applied to the MAC address of the Cisco DCMN system
    • D. The licenses are applied using the Cisco DCNM.
    • E. The licenses are applied using the CLI.

    Answer: CD

    Thanks for reading the newest 642-997 exam dumps! We recommend you to try the PREMIUM Surepassexam 642-997 dumps in VCE and PDF here: https://www.surepassexam.com/642-997-exam-dumps.html (151 Q&As Dumps)