An engineer is deploying a Cisco Nexus 1000v into VMWare vSphere using the OVA fie. The engineer deployed the VSM virtual machine in vCenter and completed the initial setup script of the VSM. Which two additional configuration steps are needed to implement the 100GV? (Choose two)
An engineer is deploying a Cisco Nexus 1000v into VMWare vSphere using the OVA fie. The engineer deployed the VSM virtual machine in vCenter and completed the initial setup script of the VSM. Which two additional configuration steps are needed to implement the 100GV? (Choose two)A . Configure an SVS...
Which two options must be included in your DNS server to receive email from all external senders?
Q64.Your organization is deploying an ESA for email security for inbound and outbound emails. To receive inbound emails from external organizations, you must setup your DNS servers with the appropriate records so that the sending email server can determine Which email gateway to send to. Assume that you have two...
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?
If traffic matches a DLP filter with the action set to Quarantine IP Address, what action does the FortiGate take?A . It blocks all future traffic for that IP address for a configured interval.B . It archives the data for that IP address.C . It provides a DLP block replacement...
Which of the following hardware tools would be used?
Lisa, a technician, is tasked to monitor various analog POTS lines for voice activity. Which of the following hardware tools would be used?A . Butt setB . Toner probeC . Wire mapperD . Cable certifierView AnswerAnswer: A
In Route 53, what does a Hosted Zone refer to?
In Route 53, what does a Hosted Zone refer to?A . A hosted zone is a collection of geographical load balancing rules for Route 53.B . A hosted zone is a collection of resource record sets hosted by Route 53.C . A hosted zone is a selection of specific resource...
While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?
Refer to the exhibit. While troubleshooting site-to-site VPN, you issued the show crypto isakmp sa command. What does the given output show?A . IPSec Phase 1 is established between 10.10.10.2 and 10.1.1.5.B . IPSec Phase 2 is established between 10.10.10.2 and 10.1.1.5.C . IPSec Phase 1 is down due to...
What is a valid HSRP virtual MAC address?
What is a valid HSRP virtual MAC address?A . 0000.5E00.01A3B . 0007.B400.AE01C . 0000.0C07.AC15D . 0007.5E00.B301View AnswerAnswer: C Explanation: Hot Standby Router Protocol Features and Functionality http://www.cisco.com/en/US/tech/tk648/tk362/technologies_tech_note09186a0080094a91.shtml HSRP Addressing In most cases when you configure routers to be part of an HSRP group, they listen for the HSRP MAC address...
Which of the following BEST describes the differences between VLAN hopping and session hijacking?
Which of the following BEST describes the differences between VLAN hopping and session hijacking?A . VLAN hopping involves the unauthorized transition from one VLAN to another to gain additional access. Session hijacking involves overriding a user’s web connection to execute commandsB . VLAN hopping is a brute force attack executed...
The suggested depth of installing E900 server's cabinet is:
The suggested depth of installing E900 server's cabinet is:A . 1mB . 1.2mC . 1.4mD . No requirementView AnswerAnswer: B
Which two actions should you recommend?
You are designing an Azure Web App that includes many static content files. The application is accessed from locations all over the world by using a custom domain name. You need to recommend an approach for providing access to the static content with the least amount of latency. Which two...