Which statement about file-level storage is true?
A. It is well suited for bulk file storage.
B. Support external boot-up of systems connected to them.
C. It is complicated to implement.
D. It can store files and provide storage required for special applications like database
VMFS.
Answer: A
Cisco 300-465 Exam Practice Questions
Saturday, 19 August 2017
Cisco 300-465 Practice Question 8
Which three options describe how isolation can be achieved for VMDC data center
security? (Choose three)
A. access control lists
B. intrusion prevention appliances that inspect traffic and detect security events on a perVLAN basis
C. proper infrastructure hardening
D. role-based access and authentication
E. application redundancy
F. pokey enforcement and access control
G. virtual routing and forwarding tables
Answer: A,B,G
A. access control lists
B. intrusion prevention appliances that inspect traffic and detect security events on a perVLAN basis
C. proper infrastructure hardening
D. role-based access and authentication
E. application redundancy
F. pokey enforcement and access control
G. virtual routing and forwarding tables
Answer: A,B,G
Cisco 300-465 Practice Question 7
A cloud administrator must deploy a private Cloud. The design is focused on the need to
accelerate applications delivered from private and virtual private cloud infrastructure, using
policy-based on-demand orchestration. Which two products are the most beneficial to
these efforts. (Choose two.)
A. VSG
B. Cisco Nexus 1000v
C. ASAv
D. vNAM
E. Cisco vWAAS
Answer: B,E
A. VSG
B. Cisco Nexus 1000v
C. ASAv
D. vNAM
E. Cisco vWAAS
Answer: B,E
Cisco 300-465 Practice Question 6
Which two ports are used by Intercloud fabric tunnel ports? (Choose two.)
A. TCP 6644 and 6646
B. TCP 6000 and 7010
C. UDP 6644 and 6646
D. TCP 7000 and 7010
Answer: A,C
A. TCP 6644 and 6646
B. TCP 6000 and 7010
C. UDP 6644 and 6646
D. TCP 7000 and 7010
Answer: A,C
Cisco 300-465 Practice Question 5
A cloud administrator is designing role-based access control security policies for a private
Cloud. Which two statements are the goals of these policies?
(Choose two).
A. to ensure that no known security vulnerabilities are present
B. to protect data center integrity in case of a link failure in any layer
C. lo provide content security services
D. to (educe security risks when accessing the data center
E. to control access so that administrators have access only to systems for which they have
administrative responsibilities
Answer: A,B
A. to ensure that no known security vulnerabilities are present
B. to protect data center integrity in case of a link failure in any layer
C. lo provide content security services
D. to (educe security risks when accessing the data center
E. to control access so that administrators have access only to systems for which they have
administrative responsibilities
Answer: A,B
Cisco 300-465 Practice Question 4
Which three statements about block-level storage are correct? (Choose three.)
A. It is less expensive and simple to implement.
B. Block-level storage systems are very popular with SAN.
C. It can be treated as an independent disk drive and is controlled by external Server OS.
D. Each block can be controlled like an individual hard drive.
E. Network attached storage systems usually depend on this file level storage.
F. This level storage is inexpensive to be maintained, when it is compared to its counterpart
Answer: B,C,D
A. It is less expensive and simple to implement.
B. Block-level storage systems are very popular with SAN.
C. It can be treated as an independent disk drive and is controlled by external Server OS.
D. Each block can be controlled like an individual hard drive.
E. Network attached storage systems usually depend on this file level storage.
F. This level storage is inexpensive to be maintained, when it is compared to its counterpart
Answer: B,C,D
Cisco 300-465 Practice Question 3
Which three teases are provided by the Cisco Secure Cloud Extension? (Choose three)
A. new model for mapping applications to the network
B. advanced switching features for applications that run in the provider cloud
C. web portals that generate revenue
D. support for services such as zone-base firewall and touting in the provider cloud
E. designed to abstract the instantiation of network policy and forwarding from basic network
constructs (VLANs and subnets)
F. secure Layer 2 network extension (rom a private cloud to a provider cloud
Answer: B,D,F
A. new model for mapping applications to the network
B. advanced switching features for applications that run in the provider cloud
C. web portals that generate revenue
D. support for services such as zone-base firewall and touting in the provider cloud
E. designed to abstract the instantiation of network policy and forwarding from basic network
constructs (VLANs and subnets)
F. secure Layer 2 network extension (rom a private cloud to a provider cloud
Answer: B,D,F
Subscribe to:
Posts (Atom)