2019 Free Microsoft EnsurePass 200-150 Dumps VCE and PDF Download Part 1

EnsurePass
Exam Dumps
200-150 Dumps VCE and PDF
2019 200-150 Dumps VCE and PDF

QUESTION 1

Which three addresses are valid forms of an IPv6 Address: 2001:0DB8:0000:FE01:0000:0000:0000:0000? (Choose three.)

 

A.

2001:0DB8:0000:FE01::

B.

2001:DB8:0:FE01::

C.

2001:0DB8::FE01::

D.

2001:DB8:0:FE01:0:0:0:0

 

Correct Answer: ABD

 

 

QUESTION 2

Which VTP mode disallows the creation of local VLANs?

 

A.

transparent

B.

tunneling

C.

server

D.

client

E.

off

F.

native

 

Correct Answer: D

Explanation:

“A VTP client behaves like a VTP server and transmits and receives VTP updates on its trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on another switch in the domain that is in server mode.”

 

http://www.cisco.com/en/US/docs/switches/lan/catalyst3560/software/release/12.2_52_se/configuration/guide/swvtp.html#wp1205076

 

 

QUESTION 3

On a Cisco router, which configuration register setting bypasses the contents of the NVRAM?

 

A.

0x102

B.

0x2102

C.

0x2120

D.

0x2124

E.

0x2142

 

Correct Answer: E

 

 

QUESTION 4

For witch reason would you implement a VSAN?

 

A.

to overcome the limitation of zoing

B.

to virtualize storage

C.

to segment the physical fabric into multiple logical fabrics

D.

to overcome the limitations of LUN masking

 

Correct Answer: C

QUESTION 5

Which Cisco UCS power policy mode enables a configuration that can tolerate the loss of an input power circuit?

 

A.

nonredundatnt

B.

Grid

C.

N+1 in normal mode

D.

N+1 in high-density mode

 

Correct Answer: B

Explanation:

Grid Redundant (N+N) – below: The purpose of the grid redundant mode is to enable a configuration that can tolerate the loss of either a power supply or a input power circuit. In grid-redundant mode the system can withstand the loss of any two power supplies. The Figure 5 shows the required wiringScheme for Grid Redundant power where N=2.

 

 

QUESTION 6

Refer to the exhibit. Which host can securely to the switch by using SSH?

 

image002

 

A.

10.1.15

B.

10.200.200.1

C.

10.2.1.1

D.

10.9.1.2

 

Correct Answer: A

 

 

QUESTION 7

Which two descriptions of a Fabricpath network are true? (Choose two.)

 

A.

A leaf node connects to servers.

B.

Leaf nodes can be Layer 3 devices.

C.

A spine node connects to other switch in the fabric.

D.

There is a spanning tree protocol running between leaf and spine switches

E.

A spine node connects to servers.

Correct Answer: BD

 

 

QUESTION 8

Which two networking devices forward data based on destination MAC address? (Choose two.)

 

A.

Repeater

B.

Bridge

C.

Switch

D.

Router

E.

Hub

 

Correct Answer: BC

Explanation:

http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9670/white_paper_c11-465436.html

 

 

QUESTION 9

What happens when there is no entry in the Layer 2 CAM table that corresponds to the destination MAC address of an incoming frame?

 

A.

The frame is flooded out of all forwarding ports in all VLANs.

B.

The frame is flooded out of all forwarding ports in its VLAN, except the port on which it is received.

C.

The switch drops the frame.

D.

The frame is flooded out of all forwarding ports in its VLAN, including the port on which it is received.

 

Correct Answer: B

 

 

QUESTION 10

Which two of the following statements are true with respect to STP in this network? (Choose 2)

 

A.

Both 5k’s have BPDU Guard and BPDU Filter enabled by default, while both 7k’s do not

B.

Both 5k’s bridge Assurance enabled, while both 7k’s do not

C.

7k’s is the root bridge for VLANs 100-150

D.

Both 7K-3 and 7k-4 being vPC peers, are the root bridge for VLANs 100-150

E.

No devices have a root cost higher than 1, since all devices are no more that 1 hop away from each other

 

Correct Answer: BE

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>