Which network mask do you use?
You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?A . /26B . /27C . /28D . /29View AnswerAnswer: C
How does a zone paid handle traffic if the policy definition of the zone pair is missing?
How does a zone paid handle traffic if the policy definition of the zone pair is missing?A . It permits all traffic without logging.B . it drops all trafficC . it permits and logs all trafficD . it inspects all trafficView AnswerAnswer: B
About alarm information “OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a muter whose authentication key or authentication type conflicts with the local authentication key or authentication type. ( IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId=[process-id], RouterId=[muter-id], PacketSrc=[source-ip-address],ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name] ) ” which description is wrong?
About alarm information “OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a muter whose authentication key or authentication type conflicts with the local authentication key or authentication type. ( IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId=[process-id], RouterId=[muter-id], PacketSrc=[source-ip-address],ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name] ) ” which description is wrong?A . It may be...
What is true about a virtual machine with (orphaned) appended to the display name?
What is true about a virtual machine with (orphaned) appended to the display name?A . The virtual machine has been cloned and removed from vCenter Server’s inventory.B . The template that the virtual machine was created from no longer exists.C . The virtual machine creator no longer wants the virtual...
Which of the below AWS services do you need to access to manage your SSL server certificate?
You need to set up a security certificate for a client's e-commerce website as it will use the HTTPS protocol. Which of the below AWS services do you need to access to manage your SSL server certificate?A . AWS Directory ServiceB . AWS Identity & Access ManagementC . AWS CloudFormationD . Amazon...
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)
Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)A . SessionB . transportC . presentationD . applicationE . data-linkF . networkView AnswerAnswer: ACD
Which two types of traffic are carried over a vPC peer link when no failure scenarios are present? (Choose two.)
Which two types of traffic are carried over a vPC peer link when no failure scenarios are present? (Choose two.)A . multicast data trafficB . unicast data trafficC . broadcast data trafficD . vPC keep-alive messagesView AnswerAnswer: A, C Explanation: The vPC peer link is the link used to synchronize...
At the end of an RSTP election process, which access layer switch port will assume the discarding role?
Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?A . Switch3, port fa0/1B . Switch3, port fa0/12C . Switch4, port fa0/11D . Switch4, port fa0/2E . Switch3, port Gi0/1F . Switch3, port Gi0/2View AnswerAnswer: C
In what circumstances would you conduct searches without a warrant?
In what circumstances would you conduct searches without a warrant?A . When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized constitutes evidence of criminal activityB . Agents may search a place or object without...
Which two statements are correct about Layer 2 broadcast frames? (Choose two.)
Which two statements are correct about Layer 2 broadcast frames? (Choose two.)A . Layer 2 broadcast frames are processed by all devices on the same VLAC . Layer 2 broadcast frames are discarded by routers that connect to multiple VLANs.D . Layer 2 broadcast frames are relayed by routers to...