ExamGecko
Home Home / Cisco / 300-615

Cisco 300-615 Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











Refer to the exhibit.

An engineer is investigating a role mapping issue on a switch. The users report that they cannot view the IP addresses under the tenant “corp”. Which action resolves the issue?

A.

Add the users to the RADIUS server.

A.

Add the users to the RADIUS server.

Answers
B.

Update the UNIX ID.

B.

Update the UNIX ID.

Answers
C.

Configure the correct secret password between the APIC and the RADIUS server.

C.

Configure the correct secret password between the APIC and the RADIUS server.

Answers
D.

Add the updated avpair to include/corp/admin/

D.

Add the updated avpair to include/corp/admin/

Answers
Suggested answer: D

Refer to the exhibit.

A network engineer configures an EEM script to get a syslog notification after a configuration change.

This message appears when the engineer must make a new configuration to this switch. Which configuration did the engineer neglect to apply in the script for it to function properly?

A.

event cli match ‘configure terminal’

A.

event cli match ‘configure terminal’

Answers
B.

event policy-default count 1 time 100

B.

event policy-default count 1 time 100

Answers
C.

event syslog occurs 10

C.

event syslog occurs 10

Answers
D.

action 2.0 event-default

D.

action 2.0 event-default

Answers
Suggested answer: D

Refer to the exhibit.

The EEM script overrides all events in the system policy. What should be added to the script to resolve the issue?

A.

event statement

A.

event statement

Answers
B.

environment variable

B.

environment variable

Answers
C.

event-default action statement

C.

event-default action statement

Answers
D.

configure terminal action

D.

configure terminal action

Answers
Suggested answer: A

An upgrade of protected RPMs from the Bash shell did not take effect. Which action is required for the changes to take effect?

A.

Restart the Bash shell.

A.

Restart the Bash shell.

Answers
B.

Reload the switch.

B.

Reload the switch.

Answers
C.

Upgrade the RPMs from the Guest shell.

C.

Upgrade the RPMs from the Guest shell.

Answers
D.

Disable and reenable the Bash feature.

D.

Disable and reenable the Bash feature.

Answers
Suggested answer: B

Refer to the exhibit.

Partial configuration from N9K-1 and N9K-2 is included. The client has two WANs connected.

WAN-1 is for normal business-day activities.

WAN-2 is for server backups during nonworking hours of 1:00 a.m. to 5:00 a.m. daily.

The client says that at the scheduled time for backup, the data center server failed to use the WAN-2 link to back up the servers to the cloud backup system. What is the solution to this problem?

A.

The event timer must be written in epoch time format.

A.

The event timer must be written in epoch time format.

Answers
B.

The Cisco Nexus switch must be configured with one applet because a configuration with two applets will fail.

B.

The Cisco Nexus switch must be configured with one applet because a configuration with two applets will fail.

Answers
C.

The Cron entry must be configured without double quotes.

C.

The Cron entry must be configured without double quotes.

Answers
D.

The applet called “Backup” must include an action to remove the current static route.

D.

The applet called “Backup” must include an action to remove the current static route.

Answers
Suggested answer: D

A network administrator attempts to install an application in the Cisco NX-OS Guest shell and receives an error that there is not enough space on the disk. Which command must the administrator run to increase the disk space available in the Guest shell?

A.

guestshell growdisk rootfs [size-in-MB]

A.

guestshell growdisk rootfs [size-in-MB]

Answers
B.

guestshell pvextend rootfs [size-in-MB]

B.

guestshell pvextend rootfs [size-in-MB]

Answers
C.

guestshell resize rootfs [size-in-MB]

C.

guestshell resize rootfs [size-in-MB]

Answers
D.

guestshell resize2fs rootfs [size-in-MB]

D.

guestshell resize2fs rootfs [size-in-MB]

Answers
Suggested answer: C

Refer to the exhibit.

After the configuration is performed, guestshell continues to use 2%CPU. Which action resolves the issue?

A.

Resync the database

A.

Resync the database

Answers
B.

Recreate the guestshell

B.

Recreate the guestshell

Answers
C.

Reboot the guestshell

C.

Reboot the guestshell

Answers
D.

Reboot the switch

D.

Reboot the switch

Answers
Suggested answer: C

An engineer is troubleshooting a custom AV pair that was created by a client on an external authentication server to map a read-only role for a specific security domain. Which AV pair solves the problem?

A.

shell:domains=Security_Domain_1//Read_Role_1|Read_Role_2

A.

shell:domains=Security_Domain_1//Read_Role_1|Read_Role_2

Answers
B.

shell:domains=Security_Domain_1/Write_Role_1|Read_Role_2

B.

shell:domains=Security_Domain_1/Write_Role_1|Read_Role_2

Answers
C.

shell=Security_Domain_1/Read_Role_1|Read_Role_2

C.

shell=Security_Domain_1/Read_Role_1|Read_Role_2

Answers
D.

shell:domains=Security_Domain_1/Read_Role_1|Read_Role_2

D.

shell:domains=Security_Domain_1/Read_Role_1|Read_Role_2

Answers
Suggested answer: D

A request to activate the port security database is rejected. Which action do you perform to investigate the cause of the issue?

A.

Enable the auto-learning feature.

A.

Enable the auto-learning feature.

Answers
B.

Use the force option to identify rejected devices.

B.

Use the force option to identify rejected devices.

Answers
C.

Find conflicting entries between the active and configuration databases.

C.

Find conflicting entries between the active and configuration databases.

Answers
D.

Verify that devices are fully attached to the active database.

D.

Verify that devices are fully attached to the active database.

Answers
Suggested answer: B

Your client reports that many flaps and server cluster disconnects occur in their data center. While troubleshooting the issue, you discover a network attack hitting their Cisco Nexus 7000 Series Switches and determine that the source IP addresses are spoofed. Which first-line security solution resolves this issue?

A.

Dynamic ARP Inspection

A.

Dynamic ARP Inspection

Answers
B.

Unicast RPF

B.

Unicast RPF

Answers
C.

IP Source Guard

C.

IP Source Guard

Answers
D.

Storm Control

D.

Storm Control

Answers
Suggested answer: A
Total 166 questions
Go to page: of 17