What is the expected acknowledgment and its usage?

A packet capture log indicates that several router solicitation messages were sent from a local host on the IPv6 segment. What is the expected acknowledgment and its usage?A . Router acknowledgment messages will be forwarded upstream, where the DHCP server will allocate addresses to the local host.B . Routers on...

August 13, 2018 No Comments READ MORE +

Which two additional configurations are required to enable Router1 and Router 2 to established the tunnel?

Refer to the exhibit. You are configuring Router 1 and Router 2 for L2TPv3 tunneling. Which two additional configurations are required to enable Router1 and Router 2 to established the tunnel? (Choose two)A . Router1 must be configured to encapsulate traffic by using L2TPv3 under the pseudowire-class R1 to R2B...

August 13, 2018 No Comments READ MORE +

Which type of misconfiguration is a cause?

RSPAN has been configured on a Cisco Catalyst switch; however, traffic is not being replicated to the remote switch. Which type of misconfiguration is a cause?A . The RSPAN designated VLAN is missing the remote span command.B . The local and remote RSPAN switches are configured using different session IDs.C...

August 13, 2018 No Comments READ MORE +

What should you do on Server1?

You have a server named Server1 that runs Windows Server 2012. You promote Server1 to a domain controller. You need to view the service location (SRV) records that Server1 registers in DNS. What should you do on Server1?A . Open the Netlogon.dns file.B . Run ipconfig /displaydns.C . Run Get-DnsServerDiagnostics.D...

August 13, 2018 No Comments READ MORE +

Which tool should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains hundreds of groups, many of which are nested in other groups. The domain contains a user account named user1.User1 is a direct member of 15 groups. You need to identify of which Active Directory groups User1 is a...

August 13, 2018 No Comments READ MORE +

Which of the following is an invalid MAC address?

Which of the following is an invalid MAC address?A . AA:CE:58:FD:90:08B . 44:98:3E:F8:33:23C . 56:AD:BX:89:55:54D . 94:9E:FE:EE:8C:DFView AnswerAnswer: C

August 13, 2018 No Comments READ MORE +

Which menu path should the engineer follow to install RTMT?

An engineer receives a report that Cisco Unified Communications Manager is not responding. The engineer needs to use RTMT to check errors. Which menu path should the engineer follow to install RTMT?A . System Settings > Plugins > RTMTB . Unified Communications Serviceability > Downloads > RTMTC . Application >...

August 13, 2018 No Comments READ MORE +

Which is the minimum vSphere Distributed Switch version needed to support Network Health Check?

Which is the minimum vSphere Distributed Switch version needed to support Network Health Check?A . 6.5B . 5.1C . 4.1D . 5.5View AnswerAnswer: B

August 13, 2018 No Comments READ MORE +

What type of algorithm uses the same key to encrypt and decrypt data?

What type of algorithm uses the same key to encrypt and decrypt data?A . a symmetric algorithmB . an asymmetric algorithmC . a Public Key Infrastructure algorithmD . an IP security algorithmView AnswerAnswer: A

August 13, 2018 No Comments READ MORE +

What is the monthly charge for using the public data sets?

Amazon EC2 provides a repository of public data sets that can be seamlessly integrated into AWS cloud-based applications. What is the monthly charge for using the public data sets?A . A 1 time charge of 10$ for all the datasets.B . 1$ per dataset per monthC . 10$ per month for all the...

August 13, 2018 No Comments READ MORE +