Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)
Which two methods are used by an AP that is trying to discover a wireless LAN controller? (Choose two.)A . Cisco Discovery Protocol neighborB . querying other APsC . DHCP Option 43D . broadcasting on the local subnetE . DNS lookup CISCO-DNA-PRIMARF . localdomainView AnswerAnswer: CD Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wirelesscontrollers/119286-lap-notjoin-wlc-tshoot.html#backinfo
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?
Which method creates an EEM applet policy that is registered with EEM and runs on demand or manually?A . event manager applet ondemand event none action 1.0 syslog priority critical msg ‘This is a message from ondemand’B . event manager applet ondemand action 1.0 syslog priority critical msg ‘This is...
Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?
Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?A . 192.168.101.10B . 192.168.101.14C . 192.168.101.6D . 192.168.101.18View AnswerAnswer: D
Which NGFW mode blocks flows crossing the firewall?
Which NGFW mode blocks flows crossing the firewall?A . tapB . inlineC . passiveD . inline tapView AnswerAnswer: B Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200924-configuringfirepower-threat-defense-int.html
Which controller is the single plane of management for Cisco SD-WAN?
Which controller is the single plane of management for Cisco SD-WAN?A . vBondB . vSmartC . vManageD . vEdgeView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/solutions/CVD/SDWAN/CVD-SD-WAN-Design-2018OCT.pdf
What is the logging severity level?
Refer to this output. R1# *Feb 14 37:09:53.129: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up What is the logging severity level?A . notificationB . emergencyC . criticalD . alertView AnswerAnswer: A
Which statement allows this traffic?
A client with IP address 209.165.201.25 must access a web server on port 80 at 209.165.200.225. To allow this traffic, an engineer must add a statement to an access control list that is applied in the inbound direction on the port connecting to the web servers. Which statement allows this...
Which statement about agent-based versus agentless configuration management tools is true?
Which statement about agent-based versus agentless configuration management tools is true?A . Agentless tools use proxy nodes to interface with slave nodes.B . Agentless tools require no messaging systems between master and slaves.C . Agent-based tools do not require a high-level language interpreter such as Python or Ruby on slave...
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?
Which IP SLA operation requires the IP SLA responder to be configured on the remote end?A . UDP jitterB . ICMP jitterC . TCP connectD . ICMP echoView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/122/46sg/configuration/guide/Wrapper-46SG/swipsla.pdf
Which QoS component alters a packet to change the way that traffic is treated in the network?
Which QoS component alters a packet to change the way that traffic is treated in the network?A . policingB . classificationC . markingD . shapingView AnswerAnswer: C