Cisco Storage Networking Solutions
You work as a network administrator for Certmagic.com. You study the exhibits carefully.
What is the effect of executing the commands shown in the exhibit?
A. No hosts will be able to communicate with interface mgmt0
B. All hosts will be able to communicate with interface mgmt0
C. Host B will not be able to communicate with interface mgmt0
D. Host A will not be able to communicate with interface mgmt0
What two commands must be executed on an MDS 9000 family switch in order to change a
dynamically assigned Domain ID 5 to a static Domain ID 10 for VSAN 10? (Choose two.)
A. Certmagic 2(Config)#fcdomain domain 10
B. Certmagic 2(Config-if)#no shut fcdomain 10
C. Certmagic 2(Config-if)#shut fcdomain 5
D. Certmagic 2(Config)#fcdomain restart disruptive vsan 10
E. Certmagic 2(Config)#fcdomain domain 10 static vsan 10
F. Certmagic 2(Config)#fcdomain restart vsan 10
Answer: D, E
You have been asked to convert three existing ISLs into a PortChannel as nondisruptively as
possible. Which approach will best accomplish this?
A. Convert the ISLs into EISL and then place them into a PortChannel
B. Ensure that the VSAN allowed lists on both ends of each link are identically configured,
then create the three-link PortChannel
C. Place all three ISLs into a PortChannel, because PortChannel creation is a nondisruptive
D. Place one link into a single-link PortChannel and then add the other two links to the
The MDS 9000 family switches use what three technologies to protect against unauthorized
management access? (Choose three.)
Answer: A, D, F
What is the default policy when defining role-based access for a VSAN?
A. Permit only for the default