Cisco 300-615 Practice Test - Questions Answers, Page 5
List of questions
Related questions
Refer to the exhibit.
An engineer is investigating a role mapping issue on a switch. The users report that they cannot view the IP addresses under the tenant “corp”. Which action resolves the issue?
Add the users to the RADIUS server.
Update the UNIX ID.
Configure the correct secret password between the APIC and the RADIUS server.
Add the updated avpair to include/corp/admin/
Refer to the exhibit.
A network engineer configures an EEM script to get a syslog notification after a configuration change.
This message appears when the engineer must make a new configuration to this switch. Which configuration did the engineer neglect to apply in the script for it to function properly?
event cli match ‘configure terminal’
event policy-default count 1 time 100
event syslog occurs 10
action 2.0 event-default
Refer to the exhibit.
The EEM script overrides all events in the system policy. What should be added to the script to resolve the issue?
event statement
environment variable
event-default action statement
configure terminal action
An upgrade of protected RPMs from the Bash shell did not take effect. Which action is required for the changes to take effect?
Restart the Bash shell.
Reload the switch.
Upgrade the RPMs from the Guest shell.
Disable and reenable the Bash feature.
Refer to the exhibit.
Partial configuration from N9K-1 and N9K-2 is included. The client has two WANs connected.
WAN-1 is for normal business-day activities.
WAN-2 is for server backups during nonworking hours of 1:00 a.m. to 5:00 a.m. daily.
The client says that at the scheduled time for backup, the data center server failed to use the WAN-2 link to back up the servers to the cloud backup system. What is the solution to this problem?
The event timer must be written in epoch time format.
The Cisco Nexus switch must be configured with one applet because a configuration with two applets will fail.
The Cron entry must be configured without double quotes.
The applet called “Backup” must include an action to remove the current static route.
A network administrator attempts to install an application in the Cisco NX-OS Guest shell and receives an error that there is not enough space on the disk. Which command must the administrator run to increase the disk space available in the Guest shell?
guestshell growdisk rootfs [size-in-MB]
guestshell pvextend rootfs [size-in-MB]
guestshell resize rootfs [size-in-MB]
guestshell resize2fs rootfs [size-in-MB]
Refer to the exhibit.
After the configuration is performed, guestshell continues to use 2%CPU. Which action resolves the issue?
Resync the database
Recreate the guestshell
Reboot the guestshell
Reboot the switch
An engineer is troubleshooting a custom AV pair that was created by a client on an external authentication server to map a read-only role for a specific security domain. Which AV pair solves the problem?
shell:domains=Security_Domain_1//Read_Role_1|Read_Role_2
shell:domains=Security_Domain_1/Write_Role_1|Read_Role_2
shell=Security_Domain_1/Read_Role_1|Read_Role_2
shell:domains=Security_Domain_1/Read_Role_1|Read_Role_2
A request to activate the port security database is rejected. Which action do you perform to investigate the cause of the issue?
Enable the auto-learning feature.
Use the force option to identify rejected devices.
Find conflicting entries between the active and configuration databases.
Verify that devices are fully attached to the active database.
Your client reports that many flaps and server cluster disconnects occur in their data center. While troubleshooting the issue, you discover a network attack hitting their Cisco Nexus 7000 Series Switches and determine that the source IP addresses are spoofed. Which first-line security solution resolves this issue?
Dynamic ARP Inspection
Unicast RPF
IP Source Guard
Storm Control
Question