The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?
Refer to the exhibit. The EtherChannel between SW2 and SW3 is not operational which action resolves this issue?A . Configure the channel-group mode on SW2 Gi0/1 and Gi0/1 to on.B . Configure the channel-group mode on SW3 Gi0/1 to activeC . Configure the mode on SW2 Gi0/0 to trunkD ....
What does Call Admission Control require the client to send in order to reserve the bandwidth?
What does Call Admission Control require the client to send in order to reserve the bandwidth?A . SIP flow informationB . Wi-Fi multimediaC . traffic specificationD . VoIP media session awarenessView AnswerAnswer: C
Which command completes the configuration?
Refer to the Exhibit. A network engineer must configure NETCONF. After creating the configuration, the engineer gets output from the command show line, but not from show running-config. Which command completes the configuration? A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: C
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?
Which solution do laaS service providers use to extend a Layer 2 segment across a Layer 3 network?A . VLANB . VTEPC . VXLAND . VRFView AnswerAnswer: C
What is a benefit of a virtual machine when compared with a physical server?
What is a benefit of a virtual machine when compared with a physical server?A . Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware.B . Virtual machines increase server processing performance.C . The CPU and RAM resources on a virtual machine cannot...
What is required to complete this task?
Refer to the Exhibit. A network engineer must configure a password expiry mechanism on the gateway router for all local passwords to expire after 60 days. What is required to complete this task?A . The password expiry mechanism is on the AAA server and must be configured there.B . Add...
Which method of account authentication does OAuth 2.0 within REST APIs?
Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combinationB . access tokensC . cookie authenticationD . basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?
Which devices does Cisco DNA Center configure when deploying an IP-based access control policy?A . All devices integrating with ISEB . selected individual devicesC . all devices in selected sitesD . all wired devicesView AnswerAnswer: C Explanation: When you click Deploy, Cisco DNA Center requests the Cisco Identity Services Engine...
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?
Which threat defence mechanism, when deployed at the network perimeter, protects against zero-day attacks?A . intrusion preventionB . stateful inspectionC . sandboxD . SSL decryptionView AnswerAnswer: C Explanation: Reference: https://www.cisco.com/c/en/us/products/collateral/security/amp-appliances/datasheet-c78-733182.html “File analysis and sandboxing: Secure Malware Analytics’ highly secure environment helps you execute, analyze, and test malware behavior to discover...
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?
Which technology uses network traffic telemetry, contextual information, and file reputation to provide insight into cyber threats?A . threat defenseB . security servicesC . security intelligenceD . segmentationView AnswerAnswer: C