300 180 Practice}

Submitted by: Henry Kay

Question: 1

A customer is trying to boot an operating system that is installed on the eUSB on a Cisco UCS B-Series blade server; however, the boot fails. What is the cause of this failure?

A. The local disk must be the first device in the boot order.

B. eUSB is not a supported boot device.

C. eUSB support is available only on the Cisco UCS C-Series rack server.

D. eUSB is not the first device in the boot order for the server.

Answer: D

Question: 2

A customer is troubleshooting degraded DIMM errors on a Cisco UCS blade server and would like to reset the BMC. What is the correct command sequence to reset the BMC?

A. UCS1-A# server x/y

UCS1-A /chassis/server # scope bmc

UCS1-A /chassis/server/bmc # reset

UCS1-A /chassis/server/bmc* # commit-buffe

B. UCS1-A# server scope

UCS1-A /chassis/server # scope bmc

UCS1-A /chassis/server/bmc # reset

UCS1-A /chassis/server/bmc* # commit-buffe

C. UCS1-A# scope server x/y

UCS1-A /chassis/server # scope bmc

UCS1-A /chassis/server/bmc # reset

UCS1-A /chassis/server/bmc* # commit-buffe

D. UCS1-A# scope server x/y

UCS1-A /chassis/server # scope bmc

UCS1-A /chassis/server/bmc* # commit-buffe

Answer: C

Question: 3

Which commands can you enter to see if a component in the Cisco UCS domain generated a core file?

A. 6100-A# scope monitoring

6100-A /monitoring # scope sysdebug

6100-A /monitoring/sysdebug # show cores

Core Files:

Name Fabric ID

———- ———

B. 6100-A# scope sysdebug

6100-A /sysdebug # scope monitoring

6100-A /sysdebug/monitoring # show cores

Core Files:

Name Fabric ID

———- ———

C. 6100-A# scope system

6100-A /system # scope monitoring

6100-A /system/monitoring # show cores

Core Files:

Name Fabric ID

———- ———

D. 6100-A# scope cores

6100-A /cores # show cores

Core Files:

Name Fabric ID

———- ———

[youtube]http://www.youtube.com/watch?v=oqtrpp0vYzc[/youtube]

E. 6100-A# scope logging

6100-A /logging # scope monitoring

6100-A /logging/monitoring # show cores

Core Files:

Name Fabric ID

———- ———

Answer: A

Question: 4

Which four tech support files can you create with the Cisco UCS Manager that you can submit to Cisco TAC for support? (Choose four.)

A. UCSM

B. disk LUNs

C. fabric extende

D. memory

E. rack serve

F. chassis

G. server cache

Answer: A, C, E, F

Question: 5

Which protocols can be used to send to Cisco TAC (Technical Assistance Center) the show tech-support command output information about the Cisco UCS domain? (Choose two.)

A. TFTP

B. FTP

C. SCP

D. Telnet

E. SecureTelnet

Answer: B, C

Question: 6

The Cisco UCS Manager displays FSM information for which four of these? (Choose four.)

A. which FSM task is being executed

B. the current state of an FSM task

C. the status of the previous FSM task

D. any error codes returned while processing

E. all completed FSM tasks

F. multiple FSM tasks that completed over multiple tries

G. multiple FSM tasks that failed

Answer: A, B, C, D

Question: 7

How will the Cisco UCS Manager react when all of the FSM tasks fail?

A. retries for 60 seconds

B. raises faults and alarms

C. restarts from the previous known good task

D. sends an NOC SNMP trap email

Answer: B

Question: 8

What should you do when you see faults during the initial setup and discovery process?

A. Take note and address the faults.

B. You can safely ignore these faults.

C. Log them and try to address the first one.

D. Reboot until the error messages go away.

Answer: B

Question: 9

When using the Cisco UCS Manager GUI to troubleshoot a suspected bad memory, which logs contain data that are related to the faulty DIMM?

A. the System Event log and Faults log that are located under the Admin ta

B. the Events log and Faults log that are located under the Admin ta

C. the System Event log that is located under the Server tab in the Navigation panel and the Faults log that is located under the Admin ta

D. the System Event log that is located under the Equipment tab and the Faults log that is located under the Admin ta

Answer: D

Question: 10

Which three are valid tech support bundles to collect in the local management shell? (Choose three.)

A. UCSM

B. UCSM-MGMT

C. Port-Channel

D. Adapte

E. SAN

F. FEX

Answer: A, B, F

Question: 11

The Core File Exporter automatically exports cores to a remote server as they are generated. Which protocol does it use for this action?

A. FTP

B. SCP

C. SFTP

D. TFTP

Answer: D

Question: 12

Which log file in Cisco UCS Manager contains information about which user took a specific action?

A. user access log

B. system change log

C. audit log

D. access control log

Answer: C

Question: 13

Which statement is true about system event logs?

A. By default, they require manual clearing.

B. They report operating system crashes and errors.

C. They are also referred to as system error logs.

D. They can only be accessed from Cisco UCS Manager.

Answer: A

Question: 14

Which piece of information does the FSM provide?

A. the current task and status

B. a collection of blade statistics

C. the last user to access the resource

D. a list of faults currently suppressed by the Cisco UCS Manage

Answer: A

Question: 15

Which of these does not have an FSM associated with it?

A. vCenter connection

B. service profile

C. server hardware

D. service profile templates

Answer: D

Question: 16

Refer to the exhibit.

Which tab would be the most useful for troubleshooting a blade discovery problem?

A. Faults

B. Events

C. FSM

D. Servers

Answer: C

Question: 17

RBAC is a method of restricting access for a particular user on which two of these? (Choose two.)

A. roles

B. realm

C. locales

D. RADIUS

E. LDAP

Answer: A, C

Question: 18

Which two types of ports does end host mode switching have? (Choose two.)

A. VSS

B. borde

C. route

D. serve

E. STP

F. client

Answer: B, D

Question: 19

In a Cisco UCS environment, what are the three power types in a power policy? (Choose three.)

A. backup

B. grid

C. redund

D. n-plus-1

E. non-redund

F. plus-1

Answer: B, D, E

Question: 20

When a service profile is disassociated from a server, what happens to the identity and connectivity information for the server?

A. It is cleared and set to the default that was setup initially by the first configuration.

B. It is maintained and can be reused.

C. It is reset to factory defaults.

D. It uses master service profile parameters.

E. It takes parameters of other servers in the service profile.

Answer: C

About the Author: Test Information: Total Questions: 291 Test Number: 300-180 Vendor Name: CISCO Cert Name: CCNP DATA CENTER Test Name: TROUBLESHOOTING CISCO DATA CENTER INFRASTRUCTURE (DCIT) Official Site:

examcertify.co.uk

For More Details:

examcertify.co.uk/300-180.html

Get20% Immediate Discount on Full Training Material Discount Coupon Code:79741B6012

Source:

isnare.com

Permanent Link:

isnare.com/?aid=1963721&ca=Computers+and+Technology }