300-165 | Cisco 300-165 Free Practice Questions 2021

Want to know features? Want to lear more about experience? Study . Gat a success with an absolute guarantee to pass Cisco 300-165 (DCII Implementing Cisco Data Center Infrastructure (DCII)) test on your first attempt.

Free demo questions for Cisco 300-165 Exam Dumps Below:

NEW QUESTION 1
Which three items must be configured in the port profile client in Cisco UCS Manager? (Choose three.)

  • A. port profile
  • B. DVS
  • C. data center
  • D. folder
  • E. vCenter IP address
  • F. VM port group

Answer: BCD

Explanation: After associating an ESX host to a DVS, you can migrate existing VMs from the vSwitch to the DVS, and you can create VMs to use the DVS instead of the vSwitch. With the hardware-based VN-Link implementation, when a VM uses the DVS, all VM traffic passes through the DVS and ASIC-based switching is performed by the fabric interconnect.
In Cisco UCS Manager, DVSes are organized in the following hierarchy: vCenter
Folder (optional) Datacenter Folder (required) DVS
At the top of the hierarchy is the vCenter, which represents a VMware vCenter instance. Each vCenter contains one or more datacenters, and optionally vCenter folders with which you can organize the
datacenters. Each datacenter contains one or more required datacenter folders. Datacenter folders contain the DVSes.
Reference: http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/sw/gui/config/guide/1-3-
1/b_UCSM_GUI_Configuration_Guide_1_3_1/UCSM_GUI_Configuration_Guide_1_3_1_chapter28.h tml

NEW QUESTION 2
Which description of a MAC ACL is true?

  • A. It filters based on the DSCP value.
  • B. It is applied to egress traffic only.
  • C. It is applied when DHCP snooping is enabled.
  • D. It is applied to ingress traffic onl

Answer: A

NEW QUESTION 3
Scenario:
The following four questions concern the Nexus 7010’ s which are configured as a vPC pair at the
core of a Data Center network. You can utilize all the available show commands to answer the Questions Access to the running-configuration is not allowed.
Instructions:
Enter NX-OS commands on 7K-3 and 7K-4 to verity network operation and answer four multiplechoice questions
THIS TASK DOES NOT REQUIRE DEVICE CONFIGURATION.
Click on the switch to gain access to the console of the switch. No console or enable passwords are required.
To access the multiple-choice questions, click on the numbered boxes on the loft of the top panel. There are four multiple-choice questions with this task Be sure to answer all four questions before selecting the Next button
Topology:
300-165 dumps exhibit
300-165 dumps exhibit
300-165 dumps exhibit
Without having access to FabricPath show commands, how can you confirm whether FabricPath is configured on the two vPC peers 7K-3 and 7K-4?

  • A. show vpc would not indicate any downstream virtual port-channel vPC members with active VLANs
  • B. show vpc role on both 7K-3 and 7K-4 would indicate their role as primary
  • C. show interface would indicate port-channels 1 and 2 would use a port mode of fabricpath
  • D. show hsrp would be blank, since FHRP is not supported or required when using FabricPath

Answer: A

NEW QUESTION 4
Which two elements must be configured correctly for Cisco TrustSec Fibre Channel Link Encryption to work on a Cisco MDS 9000 Series Switch? (Choose two.)

  • A. AES-GMAC
  • B. key
  • C. salt
  • D. AAA
  • E. group

Answer: BC

NEW QUESTION 5
How does an FCoE end node acquire its FCoE MAC address?

  • A. server-provided MAC address
  • B. Fibre Channel name server
  • C. fabric-provided MAC address
  • D. FIP proxy

Answer: C

Explanation: The VN_Port is assigned a fabric-provided Mac address (FPMA) that is built by concatenating a 24-bit FCoE MAC address prefix (FC-MAP), ranging from 0x0E-FC-00 to 0x0E-FC-FF, to the 24-bit FCID. Being able to build a unique MAC address for the VN_Port directly from its FCID saves the switch from
having to maintain a table that associates FCID and MAC addresses. Reference:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/UF_FCoE_final.html

NEW QUESTION 6
You create a checkpoint on a Cisco Nexus 7700 Series switch. You plan to roll back the running configuration by using the checkpoint. You must ensure that changes are made only if the entire rollback can be applied successfully. Which rollback option should you use?

  • A. atomic
  • B. stop-at-first-failure
  • C. best-effort
  • D. verbose

Answer: A

NEW QUESTION 7
What is the Overlay Transport Virtualization site VLAN used for?

  • A. to allow the join interfaces at different sites to communicate
  • B. to detect devices at the site that are not capable of OTV
  • C. to allow multiple site AEDs to communicate with each other
  • D. to detect other OTV edge devices in the site

Answer: D

Explanation: The edge device performs OTV functions: it receives the Layer 2 traffic for all VLANs that need to be extended to remote locations and dynamically encapsulates the Ethernet frames into IP packets that are then sent across the transport infrastructure. It is expected that at least two OTV edge devices are deployed at each data center site to improve the resiliency.
Reference: http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Data_Center/DCI/whitepaper/DCI3_O TV_Intro/DCI_1.html

NEW QUESTION 8
Which two options should you consider when you configure a SAN zone set? (Choose two.)

  • A. VSANs can be activated by using enhanced zoning.
  • B. A SAN zone set consists of one or more SAN zones.
  • C. A SAN zone set must be activated manually on all of the fabric nodes.
  • D. Only the SAN zone set can be activated simultaneously.
  • E. One SAN zone can be the member of only one zone se

Answer: BC

NEW QUESTION 9
Which statement about scalability in Cisco OTV is true?

  • A. The control plane avoids flooding by exchanging MAC reachability.
  • B. IP-based functionality provides Layer 3 extension over any transport.
  • C. Any encapsulation overhead is avoided by using IS-IS.
  • D. Unknown unicasts are handled by the authoritative edge devic

Answer: A

Explanation: Cisco calls the underlying concept of OTV traffic forwarding "MAC routing", since it behaves as if you are routing Ethernet frames over the DCI transport. OTV uses a control plane protocol to proactively propagate MAC address reachability before traffic is allowed to pass, which eliminates dependency
on flooding mechanism to either learn MAC addresses or forward unknown unicasts. Reference:
http://www.computerworld.com/article/2515468/data-center/layer-2-data-center-interconnectoptions. html

NEW QUESTION 10
Which statement about the MPLS feature set is true?

  • A. It is not license dependent.
  • B. It can be installed from any VDC.
  • C. It can be enabled only in the default VDC.
  • D. It must be installed from the default VD

Answer: D

NEW QUESTION 11
Which two Cisco Nexus platforms support Adapter FEX? (Choose two.)

  • A. Cisco Nexus 7000 Series Switches
  • B. Cisco Nexus 5000 Series Switches
  • C. Cisco Nexus 5500 Series Switches
  • D. Cisco Nexus 4000 Series Switches
  • E. Cisco Nexus 2000 Series Fabric Extenders

Answer: CE

Explanation: At the access layer, the Adapter-FEX requires a FEX-enabled adapter on a server that connects to a parent device that supports virtualization of interfaces. The Adapter-FEX is supported on the following platforms:
• The Cisco Unified Computing System (UCS) platform supports Adapter-FEX between UCS servers and the UCS Fabric Interconnect.
• The Adapter-FEX is supported on the Cisco Nexus 5500 Series platform and on the Cisco Nexus 2200 Fabric Extender that is connected to a Cisco Nexus 5500 Series parent device. This implementation works on a variety of FEX-capable adapters, including the Cisco UCS P81E virtual interface card (VIC) adapter for the UCS C-Series platform and third party adapters such as the Broadcom BCM57712 Convergence Network Interface Card, that implement the virtual network tag (VNTag) technology.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/operations/adapter_fex
/513_n1_1/ops_adapter_fex/ops_using_adapter_fex.html

NEW QUESTION 12
When implementing Cisco Adapter FEX, which setting on the virtual interface card on the Cisco UCS C-Series Server must be configured?

  • A. uplink failover
  • B. PXE boot
  • C. network interface virtualization
  • D. VM-FEX

Answer: C

NEW QUESTION 13
Which two options are limitations of NetFlow Version 5? (Choose two.)

  • A. no support for IPv6, Layer 2, or MPLS fields
  • B. fixed field specifications
  • C. excessive network utilization
  • D. analyzes all packets on the interface

Answer: AB

NEW QUESTION 14
Which statement about the configuration of a VXLAN is true?

  • A. The source interface must be a loopback interface.
  • B. The VNI must be shared across multiple NVE interfaces.
  • C. The source interface must be a physical interface
  • D. Static MAC addresses must be configured on the interfac

Answer: A

NEW QUESTION 15
Which FCoE component is responsible for the encapsulation and de-encapsulation of Fibre Channel frames in Ethernet?

  • A. distributed FCF
  • B. FCoE node
  • C. FCoE logical endpoint
  • D. Fibre Channel forwarder
  • E. FCoE forwarder

Answer: C

Explanation: The FCoE Logical Endpoint (FCoE_LEP) is responsible for the encapsulation and deencapsulation functions of the FCoE traffic. FCoE_LEP has the standard Fibre Channel layers, starting with FC-2 and continuing up the Fibre Channel Protocol stack.
Reference:
https://www.safaribooksonline.com/library/view/ccna-dataQuestions& Answers PDF P-106 center/9780133860429/ch11lev3sec5.html

NEW QUESTION 16
You have two roles that are associated to the same user. Which statement is true about how the roles are evaluated to form the permissions of the user?

  • A. A combination of all commands that are permitted by the roles can be executed
  • B. A role that denies a command takes priority over a role that permits a command
  • C. An implicit permit is applied to both roles at the end of each rule set
  • D. Only the commands that are permitted by both roles can be executed

Answer: A

Explanation: Reference:
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_1/nxos/security/configuration/guide/sec_nx-os-cfg/sec_rbac.html

NEW QUESTION 17
Refer to Exhibit.
300-165 dumps exhibit
Which statement is true about the impact to login requests on a Cisco NX-OS switch that uses this configuration.

  • A. Hosts in the ACL are denied after 10 failed login attempts occur within 180 seconds.
  • B. Hosts in the ACL are allowed after 10 failed login attempts occur within 180 seconds.
  • C. All hosts are denied if 10 failed login attempts from hosts in the ACL occur in 180 seconds.
  • D. Hosts outside the ACL are allowed if more than 10 failed login attempts occu

Answer: D

NEW QUESTION 18
Which issue does DCB address?

  • A. low bandwidth
  • B. latency
  • C. congestion
  • D. need for jumbo frames

Answer: C

NEW QUESTION 19
Refer to the exhibit.
300-165 dumps exhibit
What is the consequence of configuring peer-gateway on the two vPC peers N7K-1 and N7K-2?

  • A. Nothing, this is the standard vPC configuration to make the feature work.
  • B. The downstream device detects only one of the vPC peers as its gateway.
  • C. The downstream device can use DMAC of N7K-1 on the link to N7K-2, and N7K-2 forwards the packet.
  • D. This configuration enables the downstream device to use DHCP to obtain its default gatewa

Answer: C

Explanation: Beginning with Cisco NX-OS 4.2(1), you can configure vPC peer devices to act as the gateway even for packets that are destined to the vPC peer device's MAC address. Use the peer-gateway command to configure this feature.
Some network-attached storage (NAS) devices or load-balancers may have features aimed to optimize the performances of particular applications. Essentially these features avoid performing a routing-table lookup when responding to a request that originated form a host not locally attached to the same subnet. Such devices may reply to traffic using the MAC address of the sender Cisco Nexus 7000 device rather than the common HSRP gateway. Such behavior is non-complaint with some basic Ethernet RFC standards. Packets reaching a vPC device for the non-local router MAC address are sent across the peer-link and could be dropped by the built in vPC loop avoidance mechanism if the final destination is behind another vPC.
The vPC peer-gateway capability allows a vPC switch to act as the active gateway for packets that are addressed to the router MAC address of the vPC peer. This feature enables local forwarding of such packets without the need to cross the vPC peer-link. In this scenario, the feature optimizes use of the peer-link and avoids potential traffic loss.
Configuring the peer-gateway feature needs to be done on both primary and secondary vPC peers and is non-disruptive to the operations of the device or to the vPC traffic. The vPC peer-gateway feature can be configured globally under the vPC domain submode.
When enabling this feature it is also required to disable IP redirects on all interface VLANs mapped over a vPC VLAN to avoid generation of IP redirect messages for packets switched through the peer gateway router. When the feature is enabled in the vPC domain, the user is notified of such a requirement through an appropriate message.
Packets arriving at the peer-gateway vPC device will have their TTL decremented, so packets carrying TTL = 1 may be dropped in transit due to TTL expire. This needs to be taken into account when the peer-gateway feature is enabled and particular network protocols sourcing packets with TTL = 1 operate on a vPC VLAN.
Reference: http://www.cisco.com/c/en/us/td/docs/switches/datacenter/sw/4_2/nxos/ interfaces/configuration/guide/if_nxos/if_vPC.html

P.S. Easily pass 300-165 Exam with 286 Q&As 2passeasy Dumps & pdf Version, Welcome to Download the Newest 2passeasy 300-165 Dumps: https://www.2passeasy.com/dumps/300-165/ (286 New Questions)