Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?
Which benefit is offered by a cloud infrastructure deployment but is lacking in an on-premises deployment?A . efficient scalabilityB . virtualizationC . storage capacityD . supported systemsView AnswerAnswer: A Explanation: Cloud infrastructure deployments offer efficient scalability, which allows for rapid adjustment to resource needs, typically in an automated fashion. This...
Which configuration change is required?
Refer to the exhibit. An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?A . Add the access-class keyword to the username commandB . Add the access-class keyword to the aaa authentication commandC...
Which measurement is used from a post wireless survey to depict the cell edge of the access points?
Which measurement is used from a post wireless survey to depict the cell edge of the access points?A . SNRB . NoiseC . RSSID . CCIView AnswerAnswer: C Explanation: RSSI (Received Signal Strength Indicator) is used from a post wireless survey to depict the cell edge of the access points....
Which encryption hashing algorithm does NTP use for authentication?
Which encryption hashing algorithm does NTP use for authentication?A . SSLB . MD5C . AES128D . AES256View AnswerAnswer: B Explanation: NTP (Network Time Protocol) uses the MD5 (Message-Digest Algorithm 5) hashing algorithm for authentication purposes. MD5 is utilized to create a hash value based on the time information being sent...
Which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting,. Which method can a client use to authenticate to the network?A . text stringB . username and passwordC . certificateD . RADIUS tokenView AnswerAnswer: B Explanation: The WLAN security settings indicate that the PSK (Pre-Shared Key) is...
Which algorithms are used to secure REST API from brute attacks and minimize the impact?
Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: To secure REST APIs from brute force attacks and minimize their impact, algorithms...
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?
When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....
In an SD-Access solution what is the role of a fabric edge node?
In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...
Drag and drop the threat defense solutions from the left onto their descriptions on the right
DRAG DROP Drag and drop the threat defense solutions from the left onto their descriptions on the right. View AnswerAnswer:
Drag and drop the virtual components from the left onto their deceptions on the right
DRAG DROP Drag and drop the virtual components from the left onto their deceptions on the right. View AnswerAnswer: