- Todd Montgomery
- CCNA Cloud Complete Study Guide
- b01.xhtml
Appendix A Answers to Review
Questions
Chapter 1: Fundamentals of Cloud
Computing
- D. The utility concept of purchasing computing resources
enables on-demand access without having to purchase the underlying
data center hardware.
- D. Scale up refers to adding cloud capacity by increasing the
capability of a computing resource.
- B, D. Hypervisors and virtual machines implement virtualized
network interface cards and Ethernet switches internally for
network communications.
- C. Hypervisors are virtualization applications that manage
virtual machines and manage resource pools for the hosted virtual
machines.
- B. On-demand server service is a key component of a cloud
service offering.
- C. Multitenancy is the term that identifies the sharing of a
single application between many cloud customers.
- A. Data centers must be designed for current and anticipated
computing workloads.
- C. Memory resource pooling allows for the grouping and
allocation of RAM.
- A, C, F. The four main cloud deployment models are community,
hybrid, private, and public. On-demand, interexchange, and
resilient are not valid cloud deployment models.
- A, D, E. Common public cloud characteristics include measured
or metered service, multitenancy usage, on-demand services
resiliency, and ubiquitous access. Tiered service is not valid, and
exclusive access is a private cloud attribute.
- A, C, F. Infrastructure as a Service, Platform as a Service,
and Software as a Service are the three primary cloud service
models. The Application, Communications, and Security models may be
valid but are not considered primary.
- B, D, F. Common cloud characteristics include metered service,
elasticity, and ubiquitous access. While interconnectivity,
virtualization, and resource pooling help to enable the cloud, they
are not considered to be a cloud characteristic.
- B. Scale out refers to adding cloud capacity by adding
additional virtual machines to spread the workload between a
greater number of VMs.
- B. Storage area networks (SANs) are high-speed storage
communication networks that connect servers to remote storage
systems.
- C. The hybrid model is a combination of cloud deployment
models.
- A, C, F. Data center–critical facilities include stable power,
cooling systems, and physical security.
- A.
Interexchange providers offer private interconnects between
corporate network and the cloud provider.
- C. Virtualization technology was a key enabler of cloud
computing by allowing on-demand computing.
- B. Public, private, community, and hybrid are common cloud
deployment models. Corporate is not considered a cloud deployment
model.
- A, C. To enable redundancy and high availability, cloud
providers structure their data centers into regions and
availability zones.
Chapter 2: Defining Cloud Service Models
- B. IaaS or Infrastructure as a Service includes the server
operating system with the underlying infrastructure but not any
applications running on the server.
- C. The three primary cloud service models defined by NIST are
Infrastructure as a Service, Platform as a Service, and Software as
a Service.
- C. Public cloud service providers offer geographical areas
known as regions for proximity to customers.
- B. Software as a Service is a cloud-based service that includes
all underlying infrastructure, the operating systems, and the
application.
- B. An availability zone is a separate and redundant facility in
a region that allows for resiliency and failover should another
availability zone in the region fail.
- B, C, D. Infrastructure is the key word in this question and
indicates that hardware, such as memory, storage, and CPUs, is
included, but higher-level services such as Linux, domain name
services, or object brokers are the responsibility of the
customer.
- B. IaaS stands for Infrastructure as a Service. All other
answers offered are not valid.
- C. SaaS or Software as a Service is the NIST service model
offering full-stack services up to and including applications such
as e-mail and big data.
- A, C, E. Isolating virtual machine instances is a security step
taken in the shared public cloud, VPNs offer encryption services,
and firewalls are network-level security devices.
- A, C. Both enterprise resource planning and analytics are
considered applications that are included in the Software as a
Service model but not as a Platform as a Service offering.
- B. IaaS or Infrastructure as a Service is the NIST service
model that addresses basic data center infrastructure such as
servers, CPUs, memory, routing/switching, and storage.
- C. PaaS stands for Platform as a Service. All other answers
offered are not valid.
- C.
Infrastructure as a Service or IaaS is the most prevalent cloud
service model that defines the underlying data center
infrastructure operations but does not include any operating
systems or applications, which remain the responsibility of the
cloud customer.
- C. SaaS stands for Software as a Service. All other answers
offered are not valid.
- C. IaaS or Infrastructure as a Service offers the basic data
center infrastructure and services that are similar to private data
centers and are frequently deployed by corporate IT
administrators.
- B. CaaS or Communications as a Service would host IP
telephones, videoconferencing, and collaboration. While SaaS and
XaaS may also apply, CaaS is more specific. PaaS does not include
applications.
- B. Of the answers offered, only Google Compute Engine is in the
PaaS service model category.
- C. When implementing the Platform as a Service in the cloud,
the application software must be provided by the customer.
- D. With so many service models being offered in the market,
XaaS, or Anything as a Service is now a defined service model.
- B, D, F. Only IaaS, PaaS, and SaaS are primary service models;
all others such as CaaS, XaaS, and DRaaS are not the primary
service models.
Chapter 3: Understanding Cloud Deployment
Models
- A. The public deployment model is accessed by the general
public and hosted in the service provider’s data center.
- C. Cloud bursting is the ability to use cloud services for
additional compute capacity on demand.
- C. Public, private, community, and hybrid are the four primary
cloud deployment models defined by NIST.
- A. The public cloud is shared by many customers across a wide
spectrum of businesses.
- D. Public, hybrid, and community clouds are shared models; the
private cloud is exclusive to one company.
- C. Cloud bursting is the ability to use cloud services for
additional compute capacity on demand.
- B, C. Resource pooling allows for the dynamic allocation and
sharing of compute resources such as CPU, memory, storage, and
networking.
- D. Private deployment models are not shared and allow the most
end-user control.
- C.
Cloud bursting refers to the ability to access additional compute
capacity in a remote cloud data center.
- A, B, E. U.S. regulations such as Sarbanes-Oxley (SOX), Payment
Card Industry Data Security Standard (PCI DSS), and the Health
Insurance Portability and Accountability Act (HIPAA) are all
natural fits for companies wanting to utilize a specialized
community cloud deployment model that allows them to meet
regulatory requirements.
- A. Public cloud deployments follow the pay-as-you-go usage
model.
- C. The service level agreement is a service provider document
that details the metrics to be delivered to the customer.
- A. Private, hybrid, and community clouds are well suited for
hosting critical applications. The public clouds are orientated
towards mainstream applications.
- D. A hybrid cloud is the interconnection between two or more
cloud deployment models.
- C, D. Community and private clouds may exist on or off the
premises, as outlined in the NIST definitions.
- B. Public cloud deployments offer scalability and on-demand
provisioning and prevent the company from purchasing peak server
capacity that sits idle most of the year.
- B. Public clouds that have provider proprietary implementations
may cause vender lock-in and lack of portability to migrate to
another cloud provider.
- B, D, E. Common customer interfaces used to manage a public
cloud deployment include the application programmable interface,
command-line interface, and browser’s graphical interface.
- B. Of the answers given, elasticity best describes the ability
to react to load demands.
- D. The hybrid model is the interconnection of two or more cloud
models.
Chapter 4: Introducing the Cisco Intercloud
Solution
- A, C, E. The Cisco Intercloud Fabric interconnects public,
private, and Cisco business partner clouds with a single management
portal and secure interconnections.
- A, D. The Cisco Intercloud Fabric includes a self-service
management portal and encrypted interconnections between the
private and one or more public clouds.
- B, D. The Intercloud solution comes in two unique application
models that are designed to work together as a complete solution.
Cisco Intercloud for Provider is for end cloud providers
that are part of the Intercloud partner cloud offering. These are
your commercial cloud providers that offer consumer services
through Intercloud. Cisco Intercloud for Business is the
traditional model for end consumers and corporations that want to
use Cisco Intercloud.
- F.
Intercloud is designed to support all the major public cloud
platforms including AWS, Azure, and the Google cloud platform as
well as the cloud offerings of Cisco’s business partners.
- A, B, C, F. The Intercloud Fabric Director (ICFD) is a single
point of management for end users and IT administrators of hybrid
cloud services included with Intercloud Fabric Director including
monitoring, user management, service catalog, policy management, VM
management, and customized portals.
- B, D. The Virtual Security Gateway is a virtual appliance based
on the Nexus 1000v that uses Cisco Virtual Path (vPath) technology
to abstract the forwarding plane, and it allows inline traffic
redirection.
- A, C, D. The Intercloud Fabric Extender, Fabric Director, and
Virtual Security Gateway are all components of the Intercloud
solution.
- C. The Intercloud Director is a centralized management portal
for hybrid cloud deployments.
- D. The CSR is an IOS-XE router running as a virtual
machine.
- B. The VSG or virtual security gateway provides edge security
and firewall services for the Intercloud Fabric to protect VM-to-VM
and VM-to-edge security.
- B. The Intercloud Fabric Switch (ICS) provides a virtualized
layer 2 Ethernet switch for local switching.
- C. Having layer 2 extensions between cloud data centers is a
feature of the Intercloud Secure Extension or ICX application.
- A, D. The Cisco Intercloud Fabric Extender and private clouds
are part of the Intercloud product offering. However, community
clouds and resource pools are not.
- A, C. Cisco Intercloud offers a central management portal, a
service catalog, and secure interconnections to public, private,
and Cisco partner clouds. Intercloud is not limited to any specific
hypervisor system.
- A, C. The Intercloud Secure Extension’s primary function is to
interact with the private cloud or on-site switch and to initiate
the secure tunnel to the far-end public Intercloud Fabric.
- A. The Intercloud Secure Extension is the initiator of the
secure tunnel, encapsulates Ethernet frames into IP packets, and
uses Datagram Transport Layer Security to ensure
confidentiality.
- B. The public cloud VMs run an agent referred to as the
Intercloud Fabric Agent (ICA). This agent provides an
overlay in the cloud environment that tunnels to the ICS for
VM-to-VM communication. Overlay statistics are also collected via
the agent and used for monitoring.
- A. The Cisco Secure Intercloud Fabric Shell is the high-level
grouping of all Cisco Intercloud Fabric products.
- C. Intercloud Fabric for Providers interconnects and
communicates directly with Azure and AWS via their own APIs. Any
other provider or managed service offering would use Intercloud
Fabric for Providers to offer the services to customers.
- A.
The Cisco Intercloud routing services can be integrated with the
ICF components or run as a separate VM image that is referred to as
CSR and includes features such as inter-VLAN routing, direct
network access to virtual machines, network address translation,
and edge firewall services.
Chapter 5: The Cisco Unified
Computing System
- C. The USC Manager stores server boot configuration information
on the Profiles tab.
- C. WWNs are a globally unique Fibre Channel address assigned by
the host bus adapter manufacturer to uniquely address a Fibre
Channel interface in a storage area network.
- C. XML APIs allow machine-to-machine automation, configuration,
and management from third-party vendors.
- D. UCS Central is the global application that manages and
monitors one or more UCS domains.
- B, C. 6300 series fabric interconnects utilize both 10Gbps and
40Gbps interfaces.
- A, C, D. The UCS 6300 series fabric interconnects provide a
converged data and storage networking fabric, host the UCSM
manager, and act as the interconnect point for the UCS 5108 blade
server chassis.
- D. UCS Manager is the Cisco-developed application used to
manage multiple UCS domains.
- B. The UCS Manager application runs on the active/standby
model.
- B. The UCS 5108 chassis can house either four full-width or
eight half-width servers.
- A, B, E. The UCS product line features the convergence of
compute, networking, and storage technologies into one integrated
and centrally managed family of products.
- C. The data plane forwarding fabric in the 6300 series fabric
interconnects are always in a forwarding mode, or an active/active
configuration.
- B. The UCS family supports a 10Gb converged switching fabric, a
design optimized for virtualized environments, centralized
management with the UCSM and UCS Central applications that can
support configurations profiles and pools, and a wide selection of
device input/output options.
- A. An Ethernet layer 3 switched interface is called a switched
virtual interface (SVI).
- B, C, D. Solid-state drives (SSDs), serial attached storage
(SAS), and serial advanced technology attachment (SATA) drives are
supported in the C-series product line.
- B, D. The unified ports in the 6332-16UP fabric interconnect
can be configured to support either native Ethernet or Fibre
Channel.
- D.
UCSM server profiles are assigned to servers in a 5108 chassis to
obtain configuration information.
- A, B, D, G. UCSM maintains pools of addressing objects that can
be dynamically applied to servers in a profile; commonly used pools
include UUID, MAC, Mgmt. IP, and WWN.
- D. UCS Central manages multiple UCS domains using APIs in the
UCS Manager application.
- A, B, E, G. The UCS Manager provides objects to configure the
6300 fabric interconnects. Configurations for VSANs, Uplinks, VLAN
identifiers, and quality-of-service configurations are stored in
UCSM and applied to the fabric interconnect modules.
- A, B, D. The primary differences between the B-series and
C-series UCS servers are locally connected storage, server, and
interface slot density.
Chapter 6: Cisco Data Center Products and
Technologies
- A, B, F, H. Resiliency, availability, flexibility, scalability,
and monitoring are key data center networking attributes.
- A. The Nexus 1000 series is a distributed virtual switch and is
a software-only product.
- C. Fibre Channel storage area networking deployments require a
lossless switching fabric.
- B. The Nexus 2000 series uses FEX technology and acts as a
remote line card connected to a 5000 or 7000 series Nexus
switch.
- C. The Nexus 5000 series is the parent switch for FEX
technology and supports unified ports for converged
networking.
- B. The data center bridging exchange protocol performs DCB peer
discovery, mismatched configuration detection, and peer link
configuration.
- A. Virtual device contexts logically partition a Nexus 7000
series switch into multiple virtual devices that appear to run
their own NX-OS and physical interfaces.
- D. The Nexus 9000 series of data center switches was developed
to operate in an application-specific infrastructure
environment.
- D. The Nexus 9000 series of data center switches is designed to
support a spine/leaf data center architecture.
- D. Software Defined Networking (SDN) replaces manual
configurations with a centralized SDN controller that is used to
automate network deployments.
- A, D, E. The Cisco three-tier network design consists of the
access, aggregation, and core layers.
- B. Fabric extension (FEX) technology is used to interconnect
and control remote Nexus 2000 series switches.
- D.
FabricPath uses the IS-IS routing protocol to provide a loop-free
layer 2 switching fabric that allows for resiliency and a loop-free
topology that uses all available interconnecting links.
- B. Overlay Transport Virtualization (OTV) is a Nexus feature
that interconnects layer 2 VLANS across a router layer 3
network.
- D. A virtual port channel enables two Nexus switches to appear
as one device when interconnected via a port channel for network
resiliency.
- D. The Nexus 9000 series, and more specifically the 9200
family, offers multirate high-speed interfaces using SFP+
technology.
- A. Software Defined networking (SDN) replaces manual per-device
configuration with a centralized controller that allows for network
automation.
- C. SDN technologies centralize and automate the network control
plane.
- B. The Application Centric Infrastructure is an SND network and
switching fabric developed by Cisco that is a centralized control
plane interoperating with a distributed Nexus 9000 network.
- A, C. The northbound SDN interface communicates to
configuration controllers and uses using a graphical interface or a
published application programmable interface (API).
- C. The Cisco APIC controller is part of the ACI family and is
the central control plane in a Nexus 9000 leaf/spine
architecture.
Chapter 7: Server Virtualization in
the Cloud
- C. A hypervisor is software that allows multiple virtual
machines to run on a single server hardware platform.
- B. A Type 1 hypervisor runs directly on the server
hardware.
- B. A Type 2 hypervisor requires an operating system to be
installed, and the Type 2 hypervisor runs as an application on the
OS.
- B, D. VirtualBox and KVM are open source hypervisors.
- B, D. The UUID and MAC address are required to be unique on
each server and are changed during the cloning process.
- A, B, C. A cloned image includes the reference for creating new
virtual servers and should include the operating system, service
packs, and security configurations.
- C. A snapshot is a software copy of a virtual machine at a
specific moment in time.
- C.
A virtual switch is a virtualized Ethernet switch that runs inside
a hypervisor and connects the virtual server’s vNICs to the outside
Ethernet network.
- D. Shared resources, rapid deployment, and portability are all
benefits of virtualization.
- C. A virtual network interface card (vNIC) is a software
representation of a hardware network interface card that virtual
machines load to connect to the outside network.
- D. Type 1 hypervisors are installed on the computer
hardware.
- D. Orchestration systems are used to provide self-service cloud
operations.
- C. The hypervisor control application for EXSi is vCenter.
- D. A virtual-to-virtual (V2V) migration is when a virtual
machine is migrated from one virtualized server environment to
another.
- B. Storage volumes can be large, and if there is limited
network bandwidth to the cloud provider, an online migration may
take a long time.
- B. A live migration over the WAN network to the cloud is
referred to as an online migration.
- A, C, D. Of the answers offered, ESXi, Hyper-V, and KVM are
Type 1 hypervisors that are often used in public and private
clouds.
- A, B, C, F. The bare-metal server supports hardware resources
such as NICs, HBAs, RAM, and CPUs.
- B, D. The question is asking for hypervisor products. Of the
answers offered, KVM and ESXi are both examples of
hypervisors.
- A. Elasticity is the process of using a pool of computing
resources in the cloud to dynamically assign and reclaim resources
as needed.
Chapter 8: Infrastructure Virtualization
- D. There are more than 16.7 million possible identifiers to be
used in the VxLAN format.
- B. vPath is a Cisco-developed protocol that can direct the flow
of traffic to virtual appliances.
- C. Enhanced VxLAN refers to the 1000v’s ability to learn hosts
as they come online and distribute MAC addresses to other 1000v
VTEPs. This reduces flooding in the environment.
- B. EVPN is an address family of BGP and is used to distribute
MAC addresses and IP routes throughout the VxLAN fabric.
- B,
D. The VMware distributed virtual switch and Cisco Nexus 1000v each
supports a centralized point of management and does not require
host-by-host configuration.
- B. Virtual switching operates at the hypervisor level.
- C. The 1000v virtual Ethernet module is a line card that
connects to vNIC on a virtual server.
- A, B, C. Layer 2 connectivity is the prime service of virtual
switching. 802.1q trunking and link aggregation control protocol
are also supported. DNS is an application, and OSPF is a routing
protocol, neither of which is a layer 2 switching function.
- D. BGP is a routing protocol and not a switching function. The
1000v supports many protocols including TrustSec, Cisco Discovery
Protocol, quality of service, and VM Tracker.
- C. The virtual security gateway executes rules and enforces
policy from the Prime Services Controller.
- B. The cloud services router is a virtualized full-featured
Cisco ASR model router with an extensive protocol support
list.
- A. The Netscaler 1000v is a Citrix virtualized application
controller that has an extensive feature list including SSL offload
and content switching.
- B. Service chains enable service stitching across the virtual
environment by redirecting traffic through multiple virtual
services before the end device is reached.
- C. While D might sound close, SNAT is used to change the source
IP address of outgoing packets to something owned by the appliance.
An example might be a load balancer. This ensures reply traffic
comes back to the load balancer.
- A, B, C, D. The CSR supports all of these protocols and more,
being a fully functional router and security appliance in the
virtual world.
- C. VMtracker connects to vCenter to discover the VMs connected
and running on the network equipment.
- D. While LLDP was true at one point in time, the correct answer
here is SPAN. SPAN gives the ability to wire capture traffic as it
moves from VM to VM.
- B. In 1000v terminology, the Ethernet interface is the
representation of the physical connection to the real switch as
seen from the 1000v’s perspective.
- B. The vmknic is a virtual adapter in the kernel for
management, live migrations, IP storage access, and more.
- C. The best answer is the configuration group. VMware doesn’t
configure or show individual virtual interfaces that connect to
each VM. Instead, port groups are used that are assigned to similar
VMs. The most common occurrence is the VM identifier.
Chapter 9: Cloud Storage
- C. Network-attached storage is available to multiple server
systems and clients over a network.
- D. Direct-connected storage is the most common connection type
in this scenario. Fibre Channel is a remote storage protocol, and
RAID is a fault tolerance technique.
- C. Pooling is the logical grouping of storage resources to
create logical storage volumes for virtualized systems.
- C. Tier 3 storage is the correct answer because it is used for
low-cost, rarely accessed applications such as data backups.
- C. The VMware File System was specifically designed for VM
storage deployments.
- D. RAID 6 writes two separate parity stripes across the entire
array and supports operations when one or two disks in the array
fail.
- C, D. Microsoft operating systems support both NTFS and
FAT.
- C. Thick provisioning allows for the maximum volume size at
deployment time. Thin provisioning uses less than the maximum, and
both Tier 1 and Tier 2 are storage models and not provisioning
techniques.
- A, C. Both the Extended File System (EXT) and the UNIX File
System (UFS) are common in Linux storage environments.
- B. Tier 2 storage is less expensive that Tier 1 and is a good
solution for many storage requirements such as web, e-mail, and
file sharing. Thick and thin are not relevant, and Tier 1 does not
meet the requirements of this question because of cost.
- B, C. The two primary drive designs found in cloud storage
systems are spinning and solid state. NTFS and EXT are both file
systems.
- A, B, C. Standardized hardware storage interconnects include
ATA, SATA, and SCSI. Block and file are not hardware
interconnections.
- C. Tiering is the process of defining the storage needs of the
cloud services consumer and aligning them with the provider’s
offerings. RAID is a hardware storage family of redundancy types.
Multipathing is a redundant SAN technique, and policies are not
related to the question.
- B. RAID groups multiple physical disks together for redundancy
and performance. Multipathing is a redundancy SAN design, masking
is a LUN access process, and tiering is a storage hierarchy
technique.
- D. RAID 5 allows a drive array to be rebuilt if a single drive
in the array fails by recovering the parity data stored across the
array. The other offered options do not contain parity data.
- C.
The UNIX File System (UFS) was developed for UNIX but is not
commonly found in many Linux operating systems. FAT, VMFS, and ZTS
are all file system types but are not common for UNIX or Linux
storage file systems.
- D. Thin provisioning allows for a less than maximum volume size
at deployment time and dynamically allocates storage capacity as
required.
- A. Only RAID 0 is the correct answer as the other options offer
recovery by writing the same file onto multiple drives, whereas
RAID 0 does not.
- D. RAID 1 is the correct answer as the other options either do
not offer recovery or require more than two disks to be
deployed.
- B, C. RAID 1+0 and 0+1 combine the striping of RAID 0 and the
mirroring of RAID 1.
Chapter 10: Storage Area Networking
- C. The host bus adapter (HBA) is a server-based interface card
used to connect the server to the storage network.
- B, C. A converged network combines LAN and SAN traffic onto a
single switching fabric. Ethernet is the standard frame type with
Fibre Channel being encapsulated into an Ethernet-based
protocol.
- B. Network-attached storage is file-based and relies on common
file systems such as NFS for Linux and CIFS for Windows.
- B, D. iSCSI and FCoE are LAN protocols specifically designed to
encapsulate storage traffic for transmission over an Ethernet
network.
- C. The initiator performs disk requests for functions such as
read or write operations.
- D, F. Common Internet File System (CIFS) and Network File
System (NFS) are standard file systems used in network-attached
storage systems.
- A. A node port can be an endpoint such as an HBA installed in a
server that connects to a SAN switch.
- A. An HBA would be defined as a node port, and the SAN switch
is a fabric port. So, A is correct. This would be an N_port to
F_port SAN connection.
- B. A fabric login process is performed when a storage device
initially connects to the SAN switch fabric to register its WWN
with the SAN fabric.
- A. LUN masking is an access control method that can restrict
specific initiators’ access to defined SAN storage targets.
- C. The iSCSI protocol encapsulates the SCSI protocol into a
TCP/IP Ethernet packet.
- B.
A VSAN logically segments a Fibre Channel SAN switch into multiple
logical SANs with each VSAN providing network serveries such as
login and initiator to target communications.
- A, C. Storage arrays and host bus adapters (HBA) are Fibre
Channel–based systems that connect to a SAN.
- D, E, H. Fibre Channel, iSCSI, and FCoE are all block-based
storage protocols.
- A, C, D. SAN permissions allow the cloud administrator to
define rights for file operations and access.
- B, C. A logical unit number (LUN) is a block of storage that
can be created over multiple disks and has a unique
identification.
- A, B. Network-attached storage systems are file-based and can
have authentication and permissions assigned.
- A. Fibre Channel over Ethernet (FCoE) encapsulates a Fibre
Channel frame into an Ethernet frame so that it can traverse an
Ethernet-based switching fabric.
- C, E. Converged networks rely on the ability to encapsulate
Fibre Channel into an Ethernet frame using standards-based options
such as iSCSI or FCoE.
- B. The SAN target, which is most commonly a storage array,
receives a SAN operation request from the initiator.
Chapter 11: Cisco Storage Product Families
and Offerings
- D. SAN-OS is the operating system for the MDS product
line.
- B, D. The UCS fabric interconnect and Nexus products support
both storage and LAN converged switch fabrics.
- B. The Nexus operating system is based on the MDS SAN switch
operating system.
- B. The 9222i is a member of the MDS family of SAN switches that
supports multiple protocols including iSCSI, FCoE, and FICON.
- B. The 9718 MDS SAN switch is a chassis-based product for
large-scale deployments.
- D. The Nexus 7000 series of chassis-based switches are designed
for data center aggregation and core switching.
- A. The Nexus Invicta C3124SA offers SSD storage arrays as part
of the UCS family.
- A, B. Both the MDS 9100 and 9200 series products are used for
SAN extension deployments.
- C.
The MDS 9300 product family is designed for top-of-rack and
end-of-row designs.
- D. The MDS 9700 products are large-scale high-availability core
SAN switches.
- A. A SAN interswitch link (ISL) interconnects SAN
switches.
- B, C. The MDS 9700 and Nexus 7000 series offer redundant
supervisors that enable ISSU support.
- B, D. The Invicta C3124SA flash storage appliance supports both
Fibre Channel and iSCSI communication protocols.
- C. The MDS 9300 series switches are designed for medium-size
deployments and offer both 48 and 96 ports.
- A. The MDS 9100 series switches are designed for small or edge
SAN implementation.
- B. The Cisco Data Center Network Manager application can be
used to configure, monitor, and manage an MDS-based SAN.
- D. Fibre Connection or FICON is an IBM mainframe storage
interconnect.
- C. NX-OS is the operating system for the Nexus product line and
is derived from the SAN-OS MDS operating system.
- D. Virtual SANs (VSANs) are supported on the complete line of
Cisco MDS SAN switches.
- C, D. Both the local and remote switchport analyzer ports can
be used to mirror traffic for monitoring and troubleshooting.
Chapter 12: Integrated Cloud Infrastructure
Offerings
- D. Express is one of the FlexPod offerings, along with Select
and Datacenter.
- D. Dell/EMC is the actual provider of the reference
architecture known as VSPEX.
- C. POD is a term that refers to a group of devices or
infrastructure designed for a certain requirement, network service,
or application.
- B. 350 is a valid offering of Vblock, along with 240, 340, 540,
and 740 as of this writing.
- A. Vblock only allows VMware.
- A. Red Hat OpenStack uses Ceph storage.
- D. FlexPod is the offering from NetApp and Cisco.
- B.
Vblock AMP or Advanced Management POD refers to the separate
management component of Vblock.
- A. Select is a FlexPod offering, along with Datacenter and
Express.
- C. Vblock is known for being an all-in-one integrated solution.
FlexRack isn’t a real solution. The others are more reliant on
reference architectures.
- C. FlexPod Select is especially designed for big data and other
select applications.
- C. The Cisco UCS blade or B-series is commonly found in several
offerings.
- A. According to Cisco, one of the goals with OpenBlock is
reduced operating costs.
- B. Dell/EMC offers support for VSPEX reference architectures.
The others aren’t Dell/EMC or aren’t reference architectures.
- C, D. Express focuses on both Hyper-V and VMware.
- C. VCE is the collaboration between Dell/EMC and Cisco. It also
partners with VMware and Intel.
- D. Of the options listed, FlexPod works more off a
collaboration between Cisco and NetApp. Both vendors work together
to troubleshoot. One could call either vendor.
- B. Vblock has an option to have Cisco’s Application Centric
Infrastructure (ACI) be installed.
- B. Of these, Vblock is the correct answer. VSPEX works, but it
isn’t an integrated solution out of the box; it is a reference
architecture.
- D. Of the options given, the Nexus 9000 series is one of the
more often used series in the integrated solutions.
Chapter 13: Configuring Roles and
Profiles
- C. The multirole access user profile capabilities of UCS
Director allow a user to perform more than one role.
- B. A user account created directly in UCSD is considered to be
a local account.
- B. Users with matching job requirements can be placed into
groups, and then the group can be assigned a role.
- B. The Storage Administrator role has storage orchestration
rights.
- B. The System Administrator has complete access to all
role-based objects.
- B.
Each user is allowed to belong to multiple roles.
- A, D. The predefined user roles in UCS Director allow for fast
deployments and ease of use.
- C. The Cisco ONE application that contains local user accounts
is the UCS Director (UCSD).
- B. UCSD supports multivendor environments.
- B, C. The system administrator and Group admin role have
permissions to create additional roles.
- B. UCSD supports multirole access profiles if a user has more
than one requirement that would necessitate a need to belong to
more than one group.
- D. Local groups are created or predefined to support specific
user functions in UCSD.
- B, D. An individual user can be assigned to more than one role
based on their requirements in the organization or if they perform
more than one role.
- A, B, C. When creating a single user account in UCS Director,
the username and e-mail address are mandatory fields, with address,
phone number, and first/last name being optional fields.
- A. The syntax “username profile_name” is the appropriate login
for a user with multiple profiles.
- C, D, E. Group Name and E-mail Address are mandatory group
fields and the rest are optional.
- B. In UCSD, users are assigned to roles where access is
defined.
- C. The Systems Administrator account is the primary management
account in UCS Director.
- B. The Group Administrator role is intended to allow an end
user the right to add end-user accounts.
- A, C. UCSD supports local user definitions and can access
remote directory services.
Chapter 14: Virtual Machine Operations
- D. UCSD currently supports VMware, Hyper-V, and KVM.
- D. The Prime Service Catalog is geared toward end users and
connects to UCS Director. It is more polished and meant for the
end-user experience.
- B. End-user self-service policies are one of the many ways you
can limit what a user can do in UCS Director.
- A.
UCS Director requires network, compute, system, and storage
policies to be configured before VMs can be provisioned.
- A, B. Both the Prime Service Catalog and UCSD provide
self-service catalogs.
- C. The Prime Service Catalog is largely focused on the GUI
experience and is written in HTML5.
- A, B. Both the Prime Service Catalog and UCSD can accomplish
this task.
- A. The Prime Service Catalog has a focus on this.
- A. VMware has the most workflows and out-of-the-box integration
with UCS Director.
- B. The UCSD network policy controls this.
- B. While it could be argued that UCSD does some as well, the
Prime Service Catalog is more marketed toward this.
- B. Of all the choices, the Prime Service Catalog is the one
that has a focus on this functionality.
- B. The storage policy is the correct answer in this case.
- A. The computing policy controls memory.
- B. The Prime Service Catalog is considered above UCSD in the
suite. The Prime Service Catalog is the overall portal when used in
conjunction with UCSD.
- B. The Prime Service Catalog is more suited for this than UCSD.
As stated previously, UCSD is primarily an engineering tool. The
Prime Service Catalog is meant for reporting, self-service,
orchestration, and more. The other answers are an OS and a
hypervisor and are not valid answers.
- C. OpenStack, Fusion, and Xen are not supported. Red Hat is an
officially supported hypervisor.
- B. Don’t be fooled by option C. UCSD is primarily meant for the
engineers working in IT with automation and orchestration tools.
Prime is more polished and meant to look like something end-user
customers would use.
- D. None of the offered options do this, as A and B are focused
on Cisco networking and C is not a product.
- B. The Prime Service Catalog is exactly that—an end user
portal. UCS Director offers this too, but it’s more for automation
and IT users.
Chapter 15: Virtual Application
Containers
- B. One of the primary advantages of deploying containers is the
ability to isolate your public cloud architecture into a private
grouping of services that you have complete control over.
- B. Containers are logical private clouds and can be
administered and managed by the container administrator.
- C. Templates are a UCS Director application feature used for
defining container resources.
- B. Virtual Application Container Segmentation services are a
logical construct composed of one or more network tiers that
contain either virtualized or physical compute resources in a
secured private network in a cloud data center that can be ordered,
managed, and removed as a single entity.
- C. A virtual application container emulates a private
cloud.
- C. The Cisco Nexus 1000v virtual switch module is required for
layer 2 switching support in a VACS deployment.
- A, B, D. The following elements are created and defined when
working with templates in UCS Director: virtual accounts, network
configuration, virtual machine configuration, security information
for the container, gateway router policy, and any options for
services and end-user needs.
- D. The Cisco UCS Director application features full life-cycle
support for virtual application containers.
- C. The UCS Director features unified licensing management for
VACS deployments.
- C. Cisco Prime Services Catalog acts as a storefront where end
users can obtain approved container configurations.
- D. All VM configurations are maintained when a container is
powered off, and the VM will power up with its configuration when
power is restored.
- D, E, F. Containers require UCSD, 1000v VSM, Prime Services
Catalog, and the Virtual Switch Update Manager.
- D. The fenced container utilizes a virtual load balancer from
F5.
- C. The virtualized version of the Application Security
Appliance is used for firewall services in VACS.
- A,
D, E. Firewall applications supported natively in UCS Director
include Linux, ASAv, and the Cisco Virtual Security Gateway
appliance.
- A. UCS Director allows containers to be modified after
deployment, which would include the addition and deletion of
virtual machines inside the VACS.
- A, E, F, G, H. Containers supported in UCS Director include
APIC, fabric, VACS, fenced virtual, and virtual security.
- B. Deployed containers can be modified when in production.
- B. Microsegmentation is a benefit of deploying virtual
application containers.
- C. The Cisco CSR 1000v is a full-featured router that supports
access control lists for network security.
Chapter 16: Intercloud Chargeback Model
- A, D, E, F. When creating a chargeback summary report, any
cost-based object can be selected including CPU, RAM, network
traffic, and unused VM resources.
- C. The Budget Watch checkbox in the budget policy configuration
will provide a hard stop on resource usage when the budget is
reached if it is unchecked.
- C, D. Object usage data is stored in daily buckets, which
allows for weekly and monthly reporting.
- B, D. The Chargeback module supports a dashboard interface and
includes chargeback templates. Cost replications and cloning are
not valid features.
- A, C, D. The UCS Director Chargeback module’s report generation
tools allow output files in XLS, PDF, and CSV formats.
- B, C, D, G. There is a wide range of cost metrics that can be
defined in the Chargeback module including CPU speed or number of
cores, the amount of memory consumed, and a one-time deployment of
fixed charge.
- A. The budget policy defined in the Chargeback module can
provide a hard limit on a resource that exceeds a budget value of
the cost of its usage.
- B. Widgets are included with the Chargeback application
software that can be used to customize the dashboard output.
- B. Cost models are where you create the costs of resources such
as CPU, RAM, memory, storage, and networking and use them as
building blocks to create a chargeback policy.
- B. UCS B-series hardware can be defined in a cost model for
resource usage billing and can be defined as either full- or
half-slot servers.
- C,
D. Usage data is collected by the Chargeback module and is stored
in daily and weekly buckets.
- B. A VM can be included in a cost model, and charges can be
applied for both active and inactive consumption.
- B. The Budget Watch checkbox in the budget policy configuration
enables the use of a resource after its quota has been
reached.
- B. Charge duration is the time interval used to measure VM
usage. The options are Hourly, Daily, Weekly, Monthly, or
Yearly.
- B, D. The chargeback cost models for storage include storage
traffic as measured in gigabytes per hour and the amount of
uncommitted storage. Logical units and VSAN assignments are not
valid selections.
- C. The value associated with objects are created in the cost
model definitions. All other options do not pertain to the
question.
- B. The Chargeback module polls VMs to collect predefined
objects to collect resource usage and produce billing and reporting
services.
- A, B, D, F. The included top five reports generate the highest
cost objects for CPU, VMs, memory, and storage.
- B. Costs are assigned to each unit when creating a cost
model.
- B, C, D. Cost models for VM memory offer the option to measure
data transfer in gigabyte per hour, total RAM reserved, and total
RAM used.
Chapter 17: Cloud Reporting Systems
- A. UCSD cloud analytics offers trending and history.
Infrastructure reports do not offer historical information beyond
snapshots.
- A, B. Both network and storage can be used as items in a cost
model for UCS Director.
- B. The Virtual infrastructure report found under Assessments is
for a health check of the entire virtual infrastructure.
- A. The showback model doesn’t charge and uses reporting and
documents to show what the costs are for using the infrastructure.
This way, the costs are still tracked and can be used for reporting
purposes. They are generally used when there are no end customers,
only internal customers.
- C. Tenants are part of ACI and have a report available on the
ACI Reporting tab of UCS Director.
- A. UCS Director reporting has basic infrastructure reports. In
contrast to CloudSense Analytics, infrastructure reports do not
have trend history and are mostly based on current data.
- C.
Map reports use both color coding and heat maps.
- A. A budget policy can be used to prevent or allow groups from
going over a predefined limit for charges.
- A, C. CloudSense Analytics generates reports in HTML or PDF
format.
- A, B. The UCSD chargeback module has the top-five reports and a
dashboard, as well as cost models, overall reporting, and
flexibility.
- B. The chargeback model is the most often thought of example.
It is the method of charging for services used and consumed by
customers or internal departments.
- A, B. The VM network details and layer 2 neighbors are two
basic reports. The MAC address report is a detailed report.
- D. Options A, B, and C are all metrics that can be tracked for
chargeback. Power is not tracked for the cost model.
- B. CloudSense Analytics includes a billing report that can be
generated.
- B. The basic infrastructure reports do not offer a historical
report.
- A. The chargeback reports use the cost model and build a report
based on the cost model type.
- D. VPC information is from the detailed section of the basic
network infrastructure reports.
- B. Of the given list, CloudSense Analytics is the one type of
reporting that can combine metrics from multiple areas.
Infrastructure reports and generic reports do not offer this
capability.
- A. The Report Builder area on the CloudSense tab allows custom
reports, including the duration of the metric, such as the last
week or day.
- C. The assessment report can verify this; one of its features
is verifying the physical infrastructure based on the VMware
hardware compatibility list.
Chapter 18: UCS Director Service
Catalogs
- C. The landing page is the default page when users log into the
end-user portal.
- B, C, D. Red Hat KVM, Microsoft Hyper-V, and VMware are the
currently supported hypervisors.
- A. The Virtual Application Cloud Segmentation template is used
to deploy traditional three-tier containers easily.
- B.
Prime Service Catalog is a separate application that can be
integrated with UCS Director that adds advanced service catalog
capabilities and allows for highly customized catalogs. vCenter is
a VMware management product, HTML Director is not a valid product,
and charge reports do not apply to the question.
- B. Powering on the UCS server is a required step of the
bare-metal service catalog workflow.
- D. The advanced catalog is meant to combine and build more
advanced functionality than just the standard catalog. This is
accomplished using workflows.
- B. Under Policies ➢ Catalogs is where you’ll find the UCS
Director catalogs.
- C. This feature can be used to run workflows after the VM has
been built.
- A. Lease options under customization in the standard catalog
offer a quick way to deal with billing, but they are not as robust
as the chargeback modules and system used outside of the
catalog.
- D. The end-user portal is a simple portal with UCS Director
that is meant to be used if you have nothing else for catalog
ordering. Prime Service Catalog is a far better choice for end-user
portal building.
- A. The standard catalog provides a simple way to select and
order virtual machines for your end users. It is only for VMs.
- C. One of the features of the UCS Director end-user portal is
the ability to upload and deploy OVFs.
- B. The advanced catalog offers many predefined workflows and
integration into products such as ACI.
- A. This is for a code that is used in the VM name for VMware.
You can then use this name to refer to the object or group of
objects in templates and policies.
- A. The service container catalog offers the ability to combine
both physical and virtual resources managed as a single
service.
- B. Publish To End Users is an option that if not selected will
make the catalog invisible to end users.
- A. As apparent by the name, the bare-metal catalog is for
deploying and ordering physical servers, not virtual ones.
- B. Share After Password Reset is one of the three options. The
others are Share Template Credentials and Do Not Share.
- A. The catalog icon is a set of predefined images the user will
see when ordering from the end-user portal.
- C. Creating, managing, and reviewing service requests are
functions of the end-user portal.
Chapter 19: Cisco Prime Service
Catalog Templates and Provisioning
- C. Categories are the basic unit to organize and put services
into.
- A, B, C. These are all items you’ll find on the front
page.
- A. UCS Director integrates and imports into Prime Service
Catalog.
- A, C, D. The servers menu portal includes VM operations such as
creating snapshots, and suspending and cloning Virtual
machines.
- A. The search portion of the front page allows a search across
all services available to the end user.
- C. My Products & Services contain many things for the end
user. It’s their dashboard and centralized location to gather
reports and metrics.
- A. Under Service Designer ➢ Categories ➢ Presentation, you can
define what category your service appears in and what
subcategory.
- A. A URL can be used, and you can also use predefined images or
load one from your computer.
- B. The shopping cart contains all the services that have yet to
be ordered. Remember, some services don’t use the shopping cart and
immediately will be ordered upon hitting Submit.
- A. You can use the Service Designer’s Permissions page to set
custom permissions. They can also be inherited through the UCS
Director import and further customized.
- A, B. You can skip the validation and not import the
certificate, or you can import it. The choice is yours.
- A. The ordering mode can change how a service is ordered,
meaning whether it goes to the shopping cart or is an immediate
order.
- A. The nickname is the right answer for reference in multiple
areas.
- A. Browse Categories is a drop-down box on the upper left of
the showcase, or front page.
- D. My Products contains the main dashboard for end users,
including the ability to manage servers with certain commands under
Server.
- A. If the shortcut on the showcase doesn’t exist, either the
search tool or the Browse Categories link can help you find what
you need.
- B, D. As of this writing, only three are shown in integrations:
UCS Director, Performance Manager, and Cloud Center.
- C.
The notifications icon looks like a mail icon and is in the
upper-right corner of the showcase, serving to notify a user of
events.
- D. There are currently eight customizable areas on the
showcase.
- A. Configured on import, the identifier field lets Prime
Service Catalog keep track of all integrated external
connections.
Chapter 20: Cisco Prime Service
Catalog Components
- C. Tasks are grouped together to build an overall
workflow.
- A, B. Both Cisco Process Orchestrator and Prime are a part of
the IAC. Cisco Server Provisioner is too, but has been deprecated
as of this writing. You might still see it on the test, so watch
out for it.
- B. Stack Designer, a part of UCS Director, helps you build
application stacks and containers.
- C. Activities allows differing workflows to be triggered on a
condition.
- B. Simply, the approval process in workflow designer can be
used to stop a workflow and ask for an approval before it
continues.
- A, C. The supported file transfer protocols for PXE booting are
HTTP and TFTP.
- B. Triggers can be used to watch for a state, and when that
state occurs, a workflow is executed.
- C, D. Stateful and stateless are the two trigger types.
- B. Component groups in UCSM are linked together in the
Application Groups section of the console.
- A, B. While not all the features, Northbound APIs and Capacity
Management are two of the features.
- A. You can skip the validation and not import the cert, or you
can import it. The choice is yours.
- C. The heat orchestration engine; an OpenStack project does
this.
- B. The RabbitMQ server is responsible for sending requests to
the orchestrator service, one of three components for Stack
Designer.
- A. The OpenStack Keystone server handles identity
management.
- A. HOT Templates are often but not always written in YAML.
- A.
The stack in stack designer refers to a collection of resources,
mainly VMs and their associated configurations.
- D. Performance Manager, a tool with a unified view into
multiple areas of the infrastructure including networking, storage
and compute. It can also do capacity planning.
- C. AMQP is used in RabbitMQ to exchange messages reliably.
- A. Puppet is used for building in Stack Designer.
- C. The UCS Performance Manager is also offered in an express
version. The large difference is it only does physical and virtual
compute. It does not monitor or report on storage and network
items, making it not as capable as the full version.
Chapter 21: Cloud Monitoring and
Remediation
- A. Syslog is the standard for local and remote logging.
- A. Widgets can be placed on the Dashboard. Widgets are
available through multiple summary statistics throughout UCS
Director.
- C. UCS Manager can manage only 1 domain and 20 chassis or less.
Any higher would require UCS Central.
- A. The shell is required because services have to stop for the
database to be backed up. This cannot be done from the GUI.
- A. Servers on the same stratum level are allowed to mutually
peer and synchronize in both directions. This is not allowed
between other levels.
- A. The Bare Metal Agent uses PXE and DHCP to assist in
configuring newly booted machines both virtual and physical.
- B, C. Options 66 and 67 are Server Name and Bootfile Name,
respectively. Both are used to help the server with where to pull
the file from and what the filename is.
- C. The Infra Manager log can be viewed at the shell when there
is a problem with the portal to see system information. The log is
also available via the portal.
- A, B. Of the options listed, Complete and In Progress are both
valid. The other states are Submitted and Failure.
- A. The assessment feature of CloudSense provides a health of
the overall virtual infrastructure as well as hardware
compatibility.
- A. The facility is meant to convey the source and category of a
message. It has a field of 0 to 23. Its usage heavily varies
between vendors.
- A,
C, D. Failure is not a level. Emergency, Warning, and Notice
are.
- A. Level 7 is the highest level and is intended for debugging
serious problems. In other words, it produces a lot of messages and
is not something that would be turned on routinely.
- D. SMTP is the standard for sending mail messages between
servers.
- B. Report Builder is the tool under CloudSense that allows you
to customize your own reports.
- C. UCS Central can scale to 10,000 endpoints and multiple UCS
domains.
- A, B. Both discover and offer are valid messages. The final two
are not messages in the DHCP spec.
- A, C. The performance and host performance reports are both
available in CloudSense. The others are not reports in
CloudSense.
- B. While some of these answers might yield statistics as asked,
the best answer is Performance Manager, which is described exactly
as the question states. It is meant as a multidomain tool for
statistics and monitoring.
- B, C. There are only two versions, Express and the normal
version, which is simply named UCS Performance Manager. The Express
version is smaller and eliminates all but compute statistics and
monitoring.