What are two common sources of interference for Wi-Fi networks? (Choose two.)
What are two common sources of interference for Wi-Fi networks? (Choose two.)A . LED lightsB . radarC . fire alarmD . conventional ovenE . rogue APView AnswerAnswer: BE
Based on this interface configuration, what is the expected state of OSPF adjacency?
Based on this interface configuration, what is the expected state of OSPF adjacency? A . 2WAY/DROTHER on both routersB . not establishedC . FULL on both routersD . FULL/BDR on R1 and FULL/BDR on R2View AnswerAnswer: B
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 514B . logging host 10.2.3.4 vrf mgmt transport udp port 514C . logging host 10.2.3.4 vrf mgmt transport tcp port 6514D ....
Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)A . Cisco Discovery Protocol neighborB . querying other APsC . DHCP Option 43D . broadcasting on the local subnetE . DNS lookup CISCO-DNA-PRIMARF . localdomainView AnswerAnswer: CD Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/119286-lap-notjoin-wlc-tshoot.html#backinfo
Which statement about route targets is true when using VRF-Lite?
Which statement about route targets is true when using VRF-Lite?A . Route targets control the import and export of routes into a customer routing table.B . When BGP is configured, route targets are transmitted as BGP standard communities.C . Route targets allow customers to be assigned overlapping addresses.D . Route...
Which command should be entered on the ports that are connected to Link2 to resolve the issue?
Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree...
Which NGFW mode blocks flows crossing the firewall?
Which NGFW mode blocks flows crossing the firewall?A . tapB . inlineC . passiveD . inline tapView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuring-firepower-threat-defense-int.html
Which two protocols are used with YANG data models? (Choose two.)
Which two protocols are used with YANG data models? (Choose two.)A . TLSB . RESTCONFC . SSHD . NETCONFE . HTTPSView AnswerAnswer: BD
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?A . event manager applet ondemand event none action 1.0 syslog priority critical msg ‘This is a message from ondemand’B . event manager applet ondemand action 1.0 syslog priority critical msg ‘This is...