What is a valid HSRP virtual MAC address?

What is a valid HSRP virtual MAC address?A . 0000.5E00.01A3B . 0007.B400.AE01C . 0000.0C07.AC15D . 0007.5E00.B301View AnswerAnswer: C Explanation: Hot Standby Router Protocol Features and Functionality http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml HSRP Addressing In most cases when you configure routers to be part of an HSRP group, they listen for the HSRP MAC address...

January 12, 2018 No Comments READ MORE +

Which of the following BEST describes the differences between VLAN hopping and session hijacking?

Which of the following BEST describes the differences between VLAN hopping and session hijacking?A . VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commandsB . VLAN hopping is a brute force attack executed...

January 12, 2018 No Comments READ MORE +

The suggested depth of installing E900 server's cabinet is:

The suggested depth of installing E900 server's cabinet is:A . 1mB . 1.2mC . 1.4mD . No requirementView AnswerAnswer: B

January 12, 2018 No Comments READ MORE +

Which two actions should you recommend?

You are designing an Azure Web App that includes many static content files. The application is accessed from locations all over the world by using a custom domain name. You need to recommend an approach for providing access to the static content with the least amount of latency. Which two...

January 12, 2018 No Comments READ MORE +

Which configuration should you use?

You are implementing a SQL Server 2016 five-node failover cluster. You need to choose a quorum configuration. Which configuration should you use?A . Distributed File System (DFS)B . Node MajorityC . Cluster Shared Volume (CSV)D . Node and Disk MajorityView AnswerAnswer: D Explanation: Node and Disk Majority (recommended for clusters...

January 12, 2018 No Comments READ MORE +

How to verify that TACACS+ connectivity to a device?

How to verify that TACACS+ connectivity to a device?A . You successfully log in to the device by using the local credentials.B . You connect to the device using SSH and receive the login prompt.C . You successfully log in to the device by using ACS credentials.D . You connect...

January 12, 2018 No Comments READ MORE +

Which configuration tool should be used to allow the One Button to Push feature to work?

A user wants to use the One Button to Push feature on a Cisco TelePresence System 500-32 video endpoint. Which configuration tool should be used to allow the One Button to Push feature to work?A . Cisco Unified Communications Manager server, phones, devices, One Button to PushB . Cisco Gigaswitch...

January 12, 2018 No Comments READ MORE +

Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?

A user is launching an EC2 instance in the US East region. Which of the below mentioned options is recommended by AWS with respect to the selection of the availability zone?A .  Always select the AZ while launching an instanceB .  Always select the US-East-1-a zone for HAC .  Do not...

January 12, 2018 No Comments READ MORE +

Which of the following key combinations he can use to recover the IMEI number?

Ron. a computer forensics expert, Is Investigating a case involving corporate espionage. He has recovered several mobile computing devices from the crime scene. One of the evidence that Ron possesses is a mobile phone from Nokia that was left in on condition. Ron needs to recover the IMEI number of...

January 12, 2018 No Comments READ MORE +