Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...
Which two GRE features are configured to prevent fragmentation? (Choose two.)
Which two GRE features are configured to prevent fragmentation? (Choose two.)A . TCP MSSB . PMTUDC . DF bit ClearD . MTU ignoreE . IP MTUF . TCP window sizeView AnswerAnswer: AE Explanation:
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?A . 15B . 1.2C . -165D . .83View AnswerAnswer: A
What is a consideration when designing a Cisco SD-Access underlay network?
What is a consideration when designing a Cisco SD-Access underlay network?A . End user subnets and endpoints are part of the underlay network.B . The underlay switches provide endpoint physical connectivity for users.C . Static routing is a requirement,D . It must support IPv4 and IPv6 underlay networksView AnswerAnswer: B...
In cisco SD_WAN, which protocol is used to measure link quality?
In cisco SD_WAN, which protocol is used to measure link quality?A . OMPB . BFDC . RSVPD . IPsecView AnswerAnswer: B Explanation: The BFD (Bidirectional Forwarding Detection) is a protocol that detects link failures as part of the Cisco SD-WAN (Viptela) high availability solution, is enabled by default on all...
Which encryption hashing algorithm does NTP use for authentication?
Which encryption hashing algorithm does NTP use for authentication?A . SSLB . MD5C . AES128D . AES256View AnswerAnswer: B Explanation: An example of configuring NTP authentication is shown below: Router1(config)#ntp authentication-key 2 md5 itexamanswers Router1(config)#ntp authenticate Router1(config)#ntp trusted-key 2
Which HTTP JSON response does the python code output give?
Refer to the exhibit. Which HTTP JSON response does the python code output give?A . NameError: name 'json' is not definedB . KeyError 'kickstart_ver_str'C . 7.61D . 7.0(3)I7(4)View AnswerAnswer: D
What is the process of password checks when a login attempt is made to the device?
A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?A . A TACACS+server is checked first. If that check fail, a database is checked?B . A TACACS+server is checked first. If that check...
Which outcome is achieved with this Python code?
Which outcome is achieved with this Python code? A . connects to a Cisco device using SSH and exports the routing table informationB . displays the output of the show command in a formatted wayC . connects to a Cisco device using SSH and exports the BGP table for the...
Drag and drop the characteristics from the left onto the routing protocols they describe on the right
DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer: