Why does it not allow him to specify the pre-shared secret?
An administrator is creating an IPsec site-to-site VPN between his corporate office and branch office. Both offices are protected by Check Point Security Gateway managed by the same Security Management Server. While configuring the VPN community to specify the pre-shared secret the administrator found that the check box to enable...
There was another Exhibit about port priority- Core switch connected to 2 dis switches which connected 2 ASW. PC1 is connected to DSW1 and DSW2 (Root Bridge). Link connected from PC1 to DSW2 is 4Gbps and DSW1 is 10Gbps. There is etherchannel trunk between DSW1 and DSW2. Default port prioirty is configured. Change in port priority so traffic goes through DSW1 to DSW2
There was another Exhibit about port priority- Core switch connected to 2 dis switches which connected 2 ASW. PC1 is connected to DSW1 and DSW2 (Root Bridge). Link connected from PC1 to DSW2 is 4Gbps and DSW1 is 10Gbps. There is etherchannel trunk between DSW1 and DSW2. Default port prioirty...
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right
Drag and drop the OSPFv3 LSA type on the left to the functionality it provides on the right View AnswerAnswer:
In Cisco ISE, which probe must be enabled to collect profiling data using Device Sensor?
In Cisco ISE, which probe must be enabled to collect profiling data using Device Sensor?A . RADIUSB . SNMPQueryC . SNMPTrapD . Network ScanE . SyslogView AnswerAnswer: A
Which three actions should you perform in sequence?
DRAG DROP You are developing an Azure web app named WebApp1. WebApp1 uses an Azure App Service plan named Plan1 that uses the B1 pricing tier. You need to configure WebApp1 to add additional instances of the app when CPU usage exceeds 70 percent for 10 minutes. Which three actions...
Which two statements about extended-range VLANs are true? (Choose two.)
Which two statements about extended-range VLANs are true? (Choose two.)A . Created in VTP server mode in VTP version 3.B . Created when switch is in VTP server mode.C . They support pruning.D . VTP version 3 stores extended-range VLAN in VLAN database.E . VTP version 1 and 2 stores...
What is the result of the configuration?
Refer to the exhibit. What is the result of the configuration?A . The EtherChannels would not form because the load-balancing method must match on the devices.B . The EtherChannels would form and function properly even though the load-balancing and EtherChannel modes do not match.C . The EtherChannels would form, but...
How is the source code for the main Linux kernel modules distributed?
How is the source code for the main Linux kernel modules distributed?A . It is included with the Linux kernel source code.B . The kernel modules are downloaded on demand as they are used during compilation.C . The kernel modules have their own release cycle and can be maintained separately...
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?
Which of the following network topologies allows only communication to take place from one node at a time by passing a token around the network?A . StarB . MeshC . BusD . RingView AnswerAnswer: D
What can be done to Frame Relay to resolve split-horizon issues?(Choose two.)
What can be done to Frame Relay to resolve split-horizon issues?(Choose two.)A . Disable Inverse ARC . Create a full-mesh topology.D . Develop multipoint subinterfaces.E . Configure point-to-point subinterfaces.F . Remove the broadcast keyword from the frame-relay map command.View AnswerAnswer: B, D Explanation: IP split horizon checking is disabled by...