port should be used for each host?

Refer to the exhibit. To protect Host A and Host B from communicating with each other, which type of PVLAN port should be used for each host?A . Host A on a promiscuous port and Host B on a community portB . Host A on a community port and Host...

August 5, 2018 No Comments READ MORE +

Which option is the benefit of per-link LFA over per-prefix LFA?

Which option is the benefit of per-link LFA over per-prefix LFA?A . It has a greater applicabilityB . It provides greater protection coverageC . It is simplerD . It enables better bandwidth utilizationView AnswerAnswer: C

August 5, 2018 No Comments READ MORE +

What is the process to configure EtherChannel?

What is the process to configure EtherChannel?A . shutdown both interface portsB . shutdown the interface on one side onlyC . Shutdown is necessary if the ports are in err-disableD . Don't need to shutdown the portsView AnswerAnswer: A

August 5, 2018 No Comments READ MORE +

Which IPV6 scope prefix should you use?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the DHCP Server role installed. You need to create an IPv6 scope on Server1. The scope must use an address space that is reserved for private...

August 5, 2018 No Comments READ MORE +

How should you configure HaContoso?

You create an availability group named HaContoso that has replicas named Server01/HA, Server02/HA, and Server03/HA. Currently, Server01l/HA is the primary replicA. You need to ensure that the following requirements are met: Backup operations occur on Server02/HA. If Server02/HA is unavailable, backup operations occur on Server03/HA. Backup operations do not occur...

August 5, 2018 No Comments READ MORE +

Does this meet the goal?

In this section, you'll see one or more sets of questions with the same scenario and problem Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals. Any of the solutions might solve the problem. It is also possible that...

August 5, 2018 No Comments READ MORE +

Where in the network would be the best place to deploy Cisco IOS IPS?

You are the security administrator for a large enterprise network with many remote locations. You have been given the assignment to deploy a Cisco IPS solution. Where in the network would be the best place to deploy Cisco IOS IPS?A . Inside the firewall of the corporate headquarters Internet connectionB...

August 5, 2018 No Comments READ MORE +

This share permanently mount to system2. domain11.example.com the user /mnt/dev, make user silene as authentication any users can get temporary write permissions from akira

This share permanently mount to system2. domain11.example.com the user /mnt/dev, make user silene as authentication any users can get temporary write permissions from akiraView AnswerAnswer: system1 : system2:

August 5, 2018 No Comments READ MORE +

What should you implement?

Note: This questions is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

August 5, 2018 No Comments READ MORE +

Does this meet the goal?

Your network contains an Active Directory domain named contoso.com. The domain contains three VLANs. The VLANs are configured as shown in the following table. All client computers run either Windows 7 or Windows 8. The corporate security policy states that all of the client computers must have the latest security...

August 5, 2018 No Comments READ MORE +