You have taken over management of an existing FlexPod system as part of a new job role. You want
to find details of existing support and service contracts available for the system.
Which two resources would you use to find this information? (Choose two.)
A customer has reviewed the latest vSphere CVD and asks you if they can use their older Cisco
servers in the new FlexPod solution and still have supported configuration.
Which statement is true in this scenario?
During a design meeting, a customer states that their goal is to deliver continuous availability across
both network and storage during business continuity events. The customer has two data centers that
are 80 km apart, and they want the configuration to be as logically unified across both sites as
In this scenario, which FlexPod data protection solution achieves this goal?
A customer with a FlexPod Datacenter solution wants to enable user access on UCS Manager.
In this scenario, which three authentication methods would be configured? (Choose three.)
A, C, D
A customer is performing a server refresh of their FlexPod solution to accommodate business
growth. The customer is interested in using Cisco C-Series servers, and supporting multiple 40 Gbps
link to each server, upgrading from the existing 10 Gbps links.
Which two VICs support these requirements? (Choose two.)
In which two sources would you verify scale out maximums for NetApp and Cisco UCS environments?
A customer wants to deploy Cisco Intersight into their FlexPod environment. The customer is using
the Cisco Intersight SaaS model.
In this scenario, which two virtual machines are required to support this requirement? (Choose two.)
You want to use Cisco UCS Manager on the Fabric Interconnects to manage attached C-Series servers.
Which two connection topologies would satisfy the requirements? (Choose two.)
A customer wants to refresh their FlexPod solution by moving from 10 Gbps to 40 Gbps networking.
They use FCoE to boot from SAN.
In this scenario, which statement is true?
An administrator wants to ensure secure authentication while accessing a NetApp ONTAP system.
In this scenario, which two access methods should be used? (Choose two.)