Cisco® 300-465 Exam Practice Questions (P. 4)
- Full Access (60 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #16
From which module must a manager or supervisor review and authorize the service when an end user submits an order in the prime service catalog?
- AOrder Management
- BService Request
- CRequisition
- DAdministration
Correct Answer:
A
end user, a manager or supervisor must review and authorize the service from the Order Management module
Reference:
http://www.cisco.com/c/en/us/td/docs/net_mgmt/datacenter_mgmt/intel_auto/service_portal/v_11_0/user/guide/CiscoPrimeServiceCatalog-11-0-
UserGuide/CiscoPrimeServiceCatalog-10-1-UserGuide_chapter_010.html
A
end user, a manager or supervisor must review and authorize the service from the Order Management module
Reference:
http://www.cisco.com/c/en/us/td/docs/net_mgmt/datacenter_mgmt/intel_auto/service_portal/v_11_0/user/guide/CiscoPrimeServiceCatalog-11-0-
UserGuide/CiscoPrimeServiceCatalog-10-1-UserGuide_chapter_010.html
send
light_mode
delete
Question #17
Which protocol is used to extend Layer 2 for long-distance bridging?
send
light_mode
delete
Question #18
A cloud administrator is considering methods for securing the cloud infrastructure. Which three statements about data plane protection are true? (Choose three.)
- AYou must preplan security policies and test them thoroughly before you implement them in an automated fashion.
- BDefine security policies after the creation of virtual machine environments.
- CStoring sensitive information on the cloud is permissible as long as the data center architecture is resilient.
- DOut-of-date corporate security policies contribute to data exposure.
- EEncrypting data at rest on the disk is extremely helpful in assuring data protection within a cloud-based data center.
- FData encryption is enforced only when an application requires it.
Correct Answer:
ABE
ABE
send
light_mode
delete
Question #19
A system administrator must use Cisco UCS Director to migrate several virtual machines from one host to another without disrupting the workload. In which two ways can the administrator accomplish this task?
- Amigrate VM policy
- Bmigrate VM wizard
- Chot VM migration wizard
- Dhot VM workflow task
- Emigrate VM workflow task BE
Correct Answer:
Explanation
Explanation
send
light_mode
delete
Question #20
A cloud administrator is designing role-based access control security policies for a private Cloud. Which two statements are the goals of these policies? (Choose two.)
- Ato ensure that no known security vulnerabilities are present
- Bto protect data center integrity in case of a link failure in any layer
- Cto provide content security services
- Dto reduce security risks when accessing the data center
- Eto control access so that administrators have access only to systems for which they have administrative responsibilities
Correct Answer:
AB
AB
send
light_mode
delete
All Pages