An engineer is implementing Cisco Intersight in a secure environment. The environment must use LDAP directory service and ensure information integrity and confidentiality. Which two steps must be taken to implement the solution? (Choose two.)

Refer to the exhibit. An engineer is implementing an ERSPAN configuration to mirror web server traffic connected to N7K-2. Which ERSPAN configuration must be applied on N7K-1 to forward traffic to the network analyzer?

An engineer is implementing VSAN 10 on multiple Cisco Nexus 5600 Series Switches and must ensure that the full zone set and active zone set are identical across the fabric. Which configuration must be implemented to meet this requirement?


Refer to the exhibit. An FCoE-attached storage connects to a Cisco Nexus 9000 Series Switch on interface ethernet1/12. After the configuration was performed. VSAN 200 failed to activate on the vfc interface. Which configuration action must be performed to bring up VSAN 200?
An engineer must integrate Cisco ACI with VMware vCenter The visualization team configured the necessary port groups and assigned them to virtual machines through VMware vCenter The final port group configuration must be protected from being changed by Cisco APIC Which action accomplishes these goals'?
An engineer installed a new Nexus switch with the mgm0interface in vrf management. Connectivity to the rest of the network needs to be tested from the guest shell of the NX-OS. Which command tests connectivity from the shell of the NX-OS?
An engineer is implementing the Cisco ACI fabric and must create two different vPCs from leaf switches A and B. The vPCs are deployed as follows:
vPC 1 encompasses ports Eth 1 /1 on leaf A and B and connects to server 1.
vPC 2 encompasses port Eth1/2 on leaf A and B and connects to server 2.
A leaf switch profile listing leaves A and B is already configured Which ACI object must be created to meet these requirements?
An engineer must back up the Cisco UCS Manager configuration to a remote server. The backup job must meet these requirements:
The backup must use the TCP protocol and be secure.
Client identification does not need to be verified before data is transmitted
The backup must contain the system configuration, including usernames, roles, and locales.
The operations team requires that the backup file is in a human-readable format.
Which set of configurations should the engineer use?
What are two capabilities of the Cisco Network Assurance
Engine? (Choose two.)

Refer to the exhibit. An engineer implements an FCoE Unified Fabric where vPC exists between N9K-A and N9K-B. To avoid rate discards, bandwidth must be regulated to account for sent traffic that exceeds the access speed. Which set of commands completes the configuration?
A)

B)

C)

D)
