Enjoy 15% Discount With Coupon 15off

Monthly Archives - December 2020

What should you configure?

You have a public load balancer that balances ports 80 and 443 across three virtual machines. You need to direct all the Remote Desktop Protocol (RDP) connections to VM3 only . What should you configure?A . a load balancing ruleB . a new public load balancer for VM3C . an...

Read more...

A customer has a Universal Forwarder (UF) with an inputs.confmonitoring its splunkd.log. The data is sent through a heavy forwarder to an indexer. Where does the Index time parsing occur?

A customer has a Universal Forwarder (UF) with an inputs.confmonitoring its splunkd.log. The data is sent through a heavy forwarder to an indexer. Where does the Index time parsing occur?A . IndexerB . Universal forwarderC . Search headD . Heavy forwarderView AnswerAnswer: D Explanation: Reference: https://www.learnsplunk.com/splunk-interview-questions.html

Read more...

An engineer must recover configuration on a Cisco MDS 9000 Series switch from a previous version that was backed up to bootflash and then verify the restoration

DRAG DROP An engineer must recover configuration on a Cisco MDS 9000 Series switch from a previous version that was backed up to bootflash and then verify the restoration. Drag and drop the commands on the left to the correct order on the right. View AnswerAnswer:

Read more...

Which statement is true?

Port security is enabled on a Cisco MDS 9000 series Switch. Which statement is true?A . Cisco Fabric Services must be disabled before enabling port security.B . Port security can be enabled only globally and affects all VSANs.C . Auto-learning is always enabled automatically when port security is enabled.D ....

Read more...

Given the security fabric topology shown in the exhibit, which two statements are true?

Refer to the exhibit. Given the security fabric topology shown in the exhibit, which two statements are true? (Choose two.)A . This security fabric topology is a logical topology view.B . There are 19 security recommendations for the security fabric.C . There are five devices that are part of the...

Read more...

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...

Read more...