An engineer must build a VXLAN flood-and-learn network. The customer requires the solution to be based on the IETF documented practice in RFC 7348. The solution must use broadcast, unknown unicast, and multicast (BUM) and include the efficient BUM and short BUM replication modes that use only shared trees.
Which technology meets these requirements?
An engineer must interconnect two geographically separated data centers. The service provider offers a Layer 2 Metro Ethernet link. The strict security policy requires that the information that is shared between two sites must be sent encrypted. The application deployed between two sites requires a line-rate throughput regardless
of the packet size and speed.
Which solution meets these requirements?
An engineer configured the OSPF protocol in the vPC topology. During the catastrophic failure of one of the vPC member switches, the traffic was routed to a black hole. This route was caused by the long convergence time caused by the delay of the vPC member switch reboot. After the failure, the engineer rebooted both switches, but the secondary switch powered on before the primary one. It caused all the vPCs to be shut down due to consistency-check violations.
Which two features must be used to prevent these situations from happening in the future? (Choose two.)
A network architect proposes a distinct Fibre Channel fabric to be used for a Cisco UCS blade server that hosts critical applications.
Which action should be implemented for the Fibre Channel traffic from the vHBA of this server to pass through
the I/O Module in the Cisco UCS chassis to a specified uplink Fibre Channel port?
A network engineer is implementing Cisco UCS Manager with Cisco UCS Central integration. The company's strict security policies require that the logical profile of virtual network adapters and logical addressing assigned to Cisco UCS servers be managed by the Cisco UCS Manager. The users must also be prevented from being able to acknowledge pending activities in the Cisco UCS Manager.
Which two profiles must be used to meet these requirements? (Choose two.)