A. network virtualization
B. server virtualization
C. orchestration and automation
D. a converged network infrastructure
E. routing table virtualization
A. Fibre Channel IDs
B. N-Port ID Virtualization
C. FDISC login commands
D. F-Port login process
A. when the environment is high-performance computing
B. specific application requirements, like GPU computing
C. when power and cooling are constrained
D. specific data requirements, like data protection (backup) and disaster recovery (multisite replication)
A. NetFlow does not use flows to provide statistics for accounting.
B. NetFlow requires changes to the packet and provides statistics based on these packet flows.
C. NetFlow identifies packet flows for both ingress and egress IP packets and provides statistics based on these packet flows.
D. NetFlow does not use flows to provide statistics for network monitoring.
A. EIGRP
B. HSRP
C. OCSP
D. GLBP
E. MPLS
F. VRRP
G. OSPF
A. 160-bit dotted hex
B. 64-bit dotted hex
C. 32-bit dotted hex
D. 48-bit dotted hex
E. 128-bit dotted hex
A. Safari
B. Microsoft Internet Explorer 6.0 or higher
C. Google Chrome 21.xx or higher
D. Mozilla Firefox 3.x or lower
E. Safari 5.0
A. Cisco Security Manager
B. Cisco Traffic Analyzer
C. Cisco DCNM-LAN server
D. Cisco DCNM-SAN Client
E. Device Discovery
A. straight-through connections that use static pinning
B. active/active fabric extenders that use vPC
C. active/active fabric extenders that use straight-through connections
D. straight-through connections that use dynamic pinning
A. Cisco Aironet
B. Cisco Catalyst switches
C. Cisco Nexus switches
D. Cisco MDS switches
E. Cisco ACE