Which network mask do you use?

You must segment your internal /24 network into a minimum of 12 subnets, each containing a minimum of 12 hosts. Which network mask do you use?A . /26B . /27C . /28D . /29View AnswerAnswer: C

June 13, 2018 No Comments READ MORE +

How does a zone paid handle traffic if the policy definition of the zone pair is missing?

How does a zone paid handle traffic if the policy definition of the zone pair is missing?A . It permits all traffic without logging.B . it drops all trafficC . it permits and logs all trafficD . it inspects all trafficView AnswerAnswer: B

June 13, 2018 No Comments READ MORE +

About alarm information “OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a muter whose authentication key or authentication type conflicts with the local authentication key or authentication type. ( IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId=[process-id], RouterId=[muter-id], PacketSrc=[source-ip-address],ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name] ) ” which description is wrong?

About alarm information “OSPF/2/IFAUTFAIL (OID) [1.3.6.1.2.1.14.16.2.6]: A packet is received on a non-virtual interface from a muter whose authentication key or authentication type conflicts with the local authentication key or authentication type. ( IfIpAddress=[ip-address], AddressLessIf=[interface-index], ProcessId=[process-id], RouterId=[muter-id], PacketSrc=[source-ip-address],ConfigErrorType=[error-type], PacketType=[packet-type], InstanceName=[instance-name] ) ” which description is wrong?A . It may be...

June 13, 2018 No Comments READ MORE +

What is true about a virtual machine with (orphaned) appended to the display name?

What is true about a virtual machine with (orphaned) appended to the display name?A . The virtual machine has been cloned and removed from vCenter Server’s inventory.B . The template that the virtual machine was created from no longer exists.C . The virtual machine creator no longer wants the virtual...

June 12, 2018 No Comments READ MORE +

Which of the below AWS services do you need to access to manage your SSL server certificate?

You need to set up a security certificate for a client's e-commerce website as it will use the HTTPS protocol. Which of the below AWS services do you need to access to manage your SSL server certificate?A .  AWS Directory ServiceB .  AWS Identity & Access ManagementC .  AWS CloudFormationD .  Amazon...

June 12, 2018 No Comments READ MORE +

Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)

Which three encapsulation layers in the OSI model are combined into the TCP/IP application layer? (Choose three)A . SessionB . transportC . presentationD . applicationE . data-linkF . networkView AnswerAnswer: ACD

June 12, 2018 No Comments READ MORE +

Which two types of traffic are carried over a vPC peer link when no failure scenarios are present? (Choose two.)

Which two types of traffic are carried over a vPC peer link when no failure scenarios are present? (Choose two.)A . multicast data trafficB . unicast data trafficC . broadcast data trafficD . vPC keep-alive messagesView AnswerAnswer: A, C Explanation: The vPC peer link is the link used to synchronize...

June 12, 2018 No Comments READ MORE +

At the end of an RSTP election process, which access layer switch port will assume the discarding role?

Refer to the exhibit. At the end of an RSTP election process, which access layer switch port will assume the discarding role?A . Switch3, port fa0/1B . Switch3, port fa0/12C . Switch4, port fa0/11D . Switch4, port fa0/2E . Switch3, port Gi0/1F . Switch3, port Gi0/2View AnswerAnswer: C

June 12, 2018 No Comments READ MORE +

In what circumstances would you conduct searches without a warrant?

In what circumstances would you conduct searches without a warrant?A . When destruction of evidence is imminent, a warrantless seizure of that evidence is justified if there is probable cause to believe that the item seized constitutes evidence of criminal activityB . Agents may search a place or object without...

June 12, 2018 No Comments READ MORE +

Which two statements are correct about Layer 2 broadcast frames? (Choose two.)

Which two statements are correct about Layer 2 broadcast frames? (Choose two.)A . Layer 2 broadcast frames are processed by all devices on the same VLAC . Layer 2 broadcast frames are discarded by routers that connect to multiple VLANs.D . Layer 2 broadcast frames are relayed by routers to...

June 12, 2018 No Comments READ MORE +