ExamGecko
Home / Cisco / 300-615 / List of questions
Ask Question

Cisco 300-615 Practice Test - Questions Answers, Page 5

Add to Whishlist

List of questions

Question 41

Report Export Collapse

Refer to the exhibit.

Cisco 300-615 image Question 41 113222 10072024010022000000

An engineer is investigating a role mapping issue on a switch. The users report that they cannot view the IP addresses under the tenant “corp”. Which action resolves the issue?

Add the users to the RADIUS server.

Add the users to the RADIUS server.

Update the UNIX ID.

Update the UNIX ID.

Configure the correct secret password between the APIC and the RADIUS server.

Configure the correct secret password between the APIC and the RADIUS server.

Add the updated avpair to include/corp/admin/

Add the updated avpair to include/corp/admin/

Suggested answer: D
asked 07/10/2024
Thanh Phan
46 questions

Question 42

Report Export Collapse

Refer to the exhibit.

Cisco 300-615 image Question 42 113223 10072024010022000000

A network engineer configures an EEM script to get a syslog notification after a configuration change.

This message appears when the engineer must make a new configuration to this switch. Which configuration did the engineer neglect to apply in the script for it to function properly?

event cli match ‘configure terminal’

event cli match ‘configure terminal’

event policy-default count 1 time 100

event policy-default count 1 time 100

event syslog occurs 10

event syslog occurs 10

action 2.0 event-default

action 2.0 event-default

Suggested answer: D
asked 07/10/2024
Thomas Schmitt
49 questions

Question 43

Report Export Collapse

Refer to the exhibit.

Cisco 300-615 image Question 43 113224 10072024010022000000

The EEM script overrides all events in the system policy. What should be added to the script to resolve the issue?

event statement

event statement

environment variable

environment variable

event-default action statement

event-default action statement

configure terminal action

configure terminal action

Suggested answer: A
asked 07/10/2024
Julius Nammeh
35 questions

Question 44

Report Export Collapse

An upgrade of protected RPMs from the Bash shell did not take effect. Which action is required for the changes to take effect?

Restart the Bash shell.

Restart the Bash shell.

Reload the switch.

Reload the switch.

Upgrade the RPMs from the Guest shell.

Upgrade the RPMs from the Guest shell.

Disable and reenable the Bash feature.

Disable and reenable the Bash feature.

Suggested answer: B
asked 07/10/2024
Michael Amann
43 questions

Question 45

Report Export Collapse

Refer to the exhibit.

Cisco 300-615 image Question 45 113226 10072024010022000000

Partial configuration from N9K-1 and N9K-2 is included. The client has two WANs connected.

WAN-1 is for normal business-day activities.

WAN-2 is for server backups during nonworking hours of 1:00 a.m. to 5:00 a.m. daily.

The client says that at the scheduled time for backup, the data center server failed to use the WAN-2 link to back up the servers to the cloud backup system. What is the solution to this problem?

The event timer must be written in epoch time format.

The event timer must be written in epoch time format.

The Cisco Nexus switch must be configured with one applet because a configuration with two applets will fail.

The Cisco Nexus switch must be configured with one applet because a configuration with two applets will fail.

The Cron entry must be configured without double quotes.

The Cron entry must be configured without double quotes.

The applet called “Backup” must include an action to remove the current static route.

The applet called “Backup” must include an action to remove the current static route.

Suggested answer: D
asked 07/10/2024
Duc Hai
46 questions

Question 46

Report Export Collapse

A network administrator attempts to install an application in the Cisco NX-OS Guest shell and receives an error that there is not enough space on the disk. Which command must the administrator run to increase the disk space available in the Guest shell?

guestshell growdisk rootfs [size-in-MB]

guestshell growdisk rootfs [size-in-MB]

guestshell pvextend rootfs [size-in-MB]

guestshell pvextend rootfs [size-in-MB]

guestshell resize rootfs [size-in-MB]

guestshell resize rootfs [size-in-MB]

guestshell resize2fs rootfs [size-in-MB]

guestshell resize2fs rootfs [size-in-MB]

Suggested answer: C
asked 07/10/2024
amy ashton
45 questions

Question 47

Report Export Collapse

Refer to the exhibit.

Cisco 300-615 image Question 47 113228 10072024010022000000

After the configuration is performed, guestshell continues to use 2%CPU. Which action resolves the issue?

Resync the database

Resync the database

Recreate the guestshell

Recreate the guestshell

Reboot the guestshell

Reboot the guestshell

Reboot the switch

Reboot the switch

Suggested answer: C
asked 07/10/2024
HWANG SEON TAE
52 questions

Question 48

Report Export Collapse

An engineer is troubleshooting a custom AV pair that was created by a client on an external authentication server to map a read-only role for a specific security domain. Which AV pair solves the problem?

shell:domains=Security_Domain_1//Read_Role_1|Read_Role_2

shell:domains=Security_Domain_1//Read_Role_1|Read_Role_2

shell:domains=Security_Domain_1/Write_Role_1|Read_Role_2

shell:domains=Security_Domain_1/Write_Role_1|Read_Role_2

shell=Security_Domain_1/Read_Role_1|Read_Role_2

shell=Security_Domain_1/Read_Role_1|Read_Role_2

shell:domains=Security_Domain_1/Read_Role_1|Read_Role_2

shell:domains=Security_Domain_1/Read_Role_1|Read_Role_2

Suggested answer: D
asked 07/10/2024
Newton Vela
46 questions

Question 49

Report Export Collapse

A request to activate the port security database is rejected. Which action do you perform to investigate the cause of the issue?

Enable the auto-learning feature.

Enable the auto-learning feature.

Use the force option to identify rejected devices.

Use the force option to identify rejected devices.

Find conflicting entries between the active and configuration databases.

Find conflicting entries between the active and configuration databases.

Verify that devices are fully attached to the active database.

Verify that devices are fully attached to the active database.

Suggested answer: B
asked 07/10/2024
Verónica Crespo
41 questions

Question 50

Report Export Collapse

Your client reports that many flaps and server cluster disconnects occur in their data center. While troubleshooting the issue, you discover a network attack hitting their Cisco Nexus 7000 Series Switches and determine that the source IP addresses are spoofed. Which first-line security solution resolves this issue?

Dynamic ARP Inspection

Dynamic ARP Inspection

Unicast RPF

Unicast RPF

IP Source Guard

IP Source Guard

Storm Control

Storm Control

Suggested answer: A
asked 07/10/2024
Daniel Hernandez Villar
38 questions
Total 166 questions
Go to page: of 17
Search

Related questions