An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)
An administrator is deploying port-security to restrict traffic from certain ports to specific MAC addresses. Which two considerations must an administrator take into account when using the switchport port-security macaddress sticky command? (Choose two.)A . The configuration will be updated with MAC addresses from traffic seen ingressing the port. The...
What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)
What are two requirements needed to enable a 4 vCPU virtual machine with Fault Tolerance? (Choose two.)A . vSphere Enterprise Plus licenseB . 10 GbE uplink for FT logging networkC . vSphere Standard licenseD . 1 GbE uplink for FT logging networkView AnswerAnswer: A,B
Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?
Using the Upgrade Wizard, which Password is required when upgrading the IP Office 500 V2?A . Manager passwordB . Security passwordC . System passwordD . Administration passwordView AnswerAnswer: C
Which two actions can you perform?
You manage an Office 365 tenant that uses SharePoint Online. The organization purchases a second domain name to use with SharePoint Online. You need to create a new site collection that uses the new domain name. Which two actions can you perform? Each correct answer presents a complete solution.A ....
Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?
A penetration tester reviews the scan results of a web application. Which of the following vulnerabilities is MOST critical and should be prioritized for exploitation?A . Stored XSSB . Full path disclosureC . Expired certificateD . Clickjacking View AnswerAnswer: A
Which command should be entered to check for network connectivity?
You have been informed from the field that a new Cisco TelePresence video endpoint has been deployed with an IPv4 address of 172.28.254.45. You need to check for connectivity from the Cisco Unified Communications Manager server. Which command should be entered to check for network connectivity?A . utils network traceroute...
What is the maximum number of virtual MAC addresses that GLBP allows per group?
What is the maximum number of virtual MAC addresses that GLBP allows per group?A . 2B . 4C . 6D . 8View AnswerAnswer: B Explanation: GLBP Virtual MAC Address Assignment A GLBP group allows up to four virtual MAC addresses per group. The AVG is responsible for assigning the virtual...
Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)
Which two issues does utilizing an IP network storage solution for IP video surveillance help overcome? (Choose two.)A . analog to IP conversionB . large, expandable storage spaceC . physical securityD . scalabilityE . faster bit rate for storageView AnswerAnswer: B, D
Which technology should you use?
You need to support web and mobile application secure logons. Which technology should you use?A . Azure Active Directory B2BB . OAuth 1.0C . LDAPD . Azure Active Directory B2CView AnswerAnswer: D
Which change will correct the issue?
A network engineer is connected via wireless to a Cisco AireOS WLC and wants to download the configuration but is unable to do so. Which change will correct the issue?A . enable management via wirelessB . connect via wired networkC . enable TelnetD . enable WebAuth SecureWebE . connect on...