How does Control Plane Policing protect the route processor?

How does Control Plane Policing protect the route processor?A . It disables access to the control plane during an attack.B . It treats the route processor as a separate entity within MQD . It dynamically enables ingress ACLs on selected interfaces.E . It marks non-essential traffic and moves it to...

May 8, 2018 No Comments READ MORE +

In which CLI configuration mode can you configure the hostname of a device?

In which CLI configuration mode can you configure the hostname of a device?A . line modeB . interface modeC . global modeD . router modeView AnswerAnswer: C

May 8, 2018 No Comments READ MORE +

Refer to the exhibit.

Refer to the exhibit. A . Unavailable GLBP active forwarderB . Incorrect GLBP IP addressC . HSRP configured on same interface as GLBPD . Layer 2 loopView AnswerAnswer: D Explanation: This section provides information you can use to troubleshoot your configuration. %GLBP-4-DUPADDR: Duplicate address The error message indicates a possible...

May 8, 2018 No Comments READ MORE +

Which option accurately describes an EPLD upgrade on supervisor modules?

Which option accurately describes an EPLD upgrade on supervisor modules?A . is disruptive in dual supervisor configurationsB . is disruptive in single supervisor configurationsC . requires an NX-OS image upgradeD . can be performed during an ISSUView AnswerAnswer: B

May 8, 2018 No Comments READ MORE +

Which one of these is a valid HSRP Virtual Mac Address?

Which one of these is a valid HSRP Virtual Mac Address?A . 0000.0C07.AC15B . 0000.5E00.01A3C . 0007.B400.AE01D . 0007.5E00.B301View AnswerAnswer: A

May 8, 2018 No Comments READ MORE +

What should you do?

You need to ensure that technicians who respond to service requests have a proficiency of at least good. What should you do?A . Create a new resource type and manually assign delivery people who meet the criteria.B . Create a new team and manually assign delivery people who meet the...

May 8, 2018 No Comments READ MORE +

Which activity is most likely to facilitate money laundering through on-line systems with inadequate controls?

Which activity is most likely to facilitate money laundering through on-line systems with inadequate controls?A . Conducting a large volume of transactionsB . Providing continuous worldwide accessC . Conducting anonymous transactionsD . Conducting large value transactionsView AnswerAnswer: B

May 8, 2018 No Comments READ MORE +

When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?

When an interface is configured with PortFast BPDU guard, how does the interface respond when it receives a BPDU?A . It continues operating normally.B . It goes into a down/down state.C . It becomes the root bridge for the configured VLAE . It goes into an errdisable state.View AnswerAnswer: D

May 8, 2018 No Comments READ MORE +

What are the protocol and direction of the call, the called party, and the transmit rate of the call?

Refer to the exhibit. The screenshots show outputs from the xStatus of a Cisco TelePresence endpoint and the VCS registrations. What are the protocol and direction of the call, the called party, and the transmit rate of the call?A . h.323, incoming, 5919*2345, 1152 Kb/sB . h.323, outgoing, 5919*2345, 1152...

May 8, 2018 No Comments READ MORE +