Which of the following is an example of two factor authentication?
Which of the following is an example of two factor authentication?A . Password, device certificate and PINB . SSL web server certificate and passwordC . User password and administrator passwordD . Password and hardware token OTPView AnswerAnswer: D
Which three features are supported by Cisco TMSPE? (Choose three.)
Which three features are supported by Cisco TMSPE? (Choose three.)A . Simplified provisioningB . LDAP user importC . Scheduling via Microsoft OutlookD . FindMeE . Jabber for WindowsF . Automatic endpoint upgradesView AnswerAnswer: A, B, D
Which statement about the prrid connection agent is true?
Which statement about the prrid connection agent is true?A . It leverages Cisco ISE control functions to manage connections and share information between partner platforms.B . It supports an agentless solution for Cisco ISD . It manages the sharing of contextual information between partner platforms.E . It can fetch user...
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?
When a switch has multiple links connected to a downstream switch, what is the first step that STP takes to prevent loops?A . STP elects the root bridgeB . STP selects the root portC . STP selects the designated portD . STP blocks one of the portsView AnswerAnswer: A
Which report should you use?
You use standard costing as the costing methodology for al products. You need to run a report that shows all inventory that is over 60 days old or over 90 days old. Which report should you use?A . Vendor agingB . Inventory agingC . Materials in processD . Standard cost...
What should you use?
You have a Hyper-V host named Server1 that runs Windows Server 2016. The host has two virtual machines (VMs) named VM1 and VM2. On the Hyper-V host, you create two virtual disks named Disk1 and Disk2. You plan to create a test environment for Storage Spaces Direct. You need to...
What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)
What are two benefits of using 6to4 as an IPv6 transition method? (Choose two.)A . 6to4 tunnels allow isolated IPv6 domains to be remotely connected over IPv4 networks.B . Manual configuration (scalability) is easier.C . Point-to-multipoint automatic tunneling (automatic 6to4) is available.D . An infinite number of address spaces are...
How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet mask of 255.255.255.240?
How many usable host are there per subnet if you have the address of 192.168.10.0 with a subnet mask of 255.255.255.240?A . 4B . 8C . 16D . 14View AnswerAnswer: D
Which of the following is the MOST likely problem?
A technician has replaced the Internet gateway router, and now no users can reach the Internet. The technician can ping the router Ethernet port but not the ISP's router IP address. Which of the following is the MOST likely problem?A . Faulty crossover cableB . DNS server is downC ....
Which three commands are valid to configure DHCP snooping for Option 82? (Choose three.)
Which three commands are valid to configure DHCP snooping for Option 82? (Choose three.)A . On the interface configuration mode; (config-if)# ip dhcp snooping trustB . On the global configuration mode; (config)# ip dhcp snooping information option allow-untrustedC . On the interface configuration mode; (config-if)# ip dhcp snooping information option...