Which action resolves the issue without opening full access to this router?
Refer to the exhibit. The ACL is placed on the inbound Gigabit 0/1 interface of the router. Host 192.168.10.10cannot SSH to host 192.168.100.10 even though the flow is permitted. Which action resolves the issue without opening full access to this router?A . Move the SSH entry to the beginning of...
Which command should the engineer use to complete this action?
A network engineer needs to verify IP SLA operations on an interface that shows on indication of excessive traffic. Which command should the engineer use to complete this action?A . show frequencyB . show trackC . show reachabilityD . show thresholdView AnswerAnswer: B
Which command must the engineer run to correct the configuration?
An engineer configured the wrong default gateway for the Cisco DNA Center enterprise interface during the install. Which command must the engineer run to correct the configuration?A . sudo maglev-config updateB . sudo maglev install config updateC . sudo maglev reinstallD . sudo update config installView AnswerAnswer: A
Which statement about IPv6 ND inspection is true?
Which statement about IPv6 ND inspection is true?A . It learns and secures bindings for stateless autoconfiguration addresses in Layer 3 neighbor tables.B . It learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables.C . It learns and secures bindings for stateful autoconfiguration addresses in Layer...
Which two protocols can cause TCP starvation? (Choose two)
Which two protocols can cause TCP starvation? (Choose two)A . TFTPB . SNMPC . SMTPD . HTTPSE . FTPView AnswerAnswer: AB
Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?
Refer to the exhibit. Which control plane policy limits BGP traffic that is destined to the CPU to 1 Mbps and ignores BGP traffic that is sent at higher rate?A . policy-map SHAPE_BGPB . policy-map LIMIT_BGPC . policy-map POLICE_BGPD . policy-map COPPView AnswerAnswer: D
Which action produces the desired configuration?
Refer to the exhibit. An engineer is trying to configure local authentication on the console line, but the device is trying to authenticate using TACACS+. Which action produces the desired configuration?A . Add the aaa authentication login default none command to the global configuration.B . Replace the capital āCā with...
Drag and drop the operations from the left onto the locations where the operations are performed on the right
DRAG DROP Drag and drop the operations from the left onto the locations where the operations are performed on the right. View AnswerAnswer: Explanation: Label Switch Router
Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right
DRAG DROP Drag and drop the addresses from the left onto the correct IPv6 filter purposes on the right. View AnswerAnswer: Explanation: HTTP and HTTPs run on TCP port 80 and 443, respectively and we have to remember them. Syslog runs on UDP port 514 while NTP runs on UDP...
Drag and drop the packet types from the left onto the correct descriptions on the right
DRAG DROP Drag and drop the packet types from the left onto the correct descriptions on the right. View AnswerAnswer: Explanation: Unlike legacy network technologies such as ISDN, Frame Relay, and ATM that defined separate data and control channels, IP carries all packets within a single pipe. Thus, IP network...