Which two prerequisites are required for an HSRP interface to come up? (Choose two.)
Which two prerequisites are required for an HSRP interface to come up? (Choose two.)A . The virtual IP address must be in the same subnet as the interface IP address.B . Configure an physical IP address for the interface and enable that interface before HSRP becomes activeC . It requires...
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?
Which Cisco Security Manager application collects information about device status and uses it to generate notifications and alerts?A . FlexConfigB . Device ManagerC . Report ManagerD . Health and Performance MonitorView AnswerAnswer: D
Which three authentication methods does GLBP use? (Choose three.)
Which three authentication methods does GLBP use? (Choose three.)A . Single Sign On authenticationB . MD5 authenticationC . No authenticationD . Plain text authenticationE . DCSP authenticationF . 6-to-4 authenticationView AnswerAnswer: BCD
Which of the following is true about stream contexts? (Choose 2)
Which of the following is true about stream contexts? (Choose 2)A . A context can modify or enhance the behavior of a streamB . A context indicates what session the stream is part ofC . A context is a set of parameters and stream wrapper specific optionsD . Contexts are...
Which statements about DNS filter profiles are true? (Choose two.)
Which statements about DNS filter profiles are true? (Choose two.)A . They can inspect HTTP traffic.B . They must be applied in firewall policies with SSL inspection enabled.C . They can block DNS request to known botnet command and control servers.D . They can redirect blocked requests to a specific...
Which type of ACL is shown in this configuration?
Refer to the exhibit. Which type of ACL is shown in this configuration?A . IPv4B . IPv6C . unifiedD . IDFWView AnswerAnswer: C
Which statement about SNMPv2 is true?
Which statement about SNMPv2 is true?A . Its privacy algorithms use MD5 encryption by default.B . it requires passwords to be encrypyedC . Its authetication and privacy algorithms are enable without default values.D . It requires passwords at least eight characters en length.View AnswerAnswer: C
What kind of structure can be deduplicated?
What kind of structure can be deduplicated?A . A FlexVolB . An aggregateC . a qtreeD . A diskView AnswerAnswer: AB
What should you do?
Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...
What are two valid live migration scenarios for virtual machines in your environment?
A company named Contoso, Ltd has five Hyper-V hosts that are configured as shown In the following table. What are two valid live migration scenarios for virtual machines in your environment? Each correct answer presents a complete solution.A . from Server4 to Server5B . from Server1 to Server5C . from...