In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?
In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?A . with IP SLAB . ARP probingC . using BFDD . with OMPView AnswerAnswer: C
In a Cisco SD-WAN solution, how is the health of a data plane tunnel monitored?A . with IP SLAB . ARP probingC . using BFDD . with OMPView AnswerAnswer: C
SIMULATION You need to ensure that unmanaged mobile devices are quarantined when the devices attempt to connect to Exchange Online. To complete this task, sign in to the Microsoft 365 portal.View AnswerAnswer: You need to configure the Exchange ActiveSync Access Settings.
Which of the following are best practices for users with the SYSADMIN/ACCOUNTADMIN roles? Choose 3 answersA . Their default role should be set to SYSTEMADMIN (the lower of the two)B . They should not set up multi_Factor Authentication (MFA)―as administrator they may need to change the MFA settings and those...
When a wired client connects to an edge switch in an SDA fabric, which component decides whether the client has access to the network?A . control-plane nodeB . Identity Service EngineC . RADIUS serverD . edge nodeView AnswerAnswer: B
An analyst wants to implement a more secure wireless authentication for office access points. Which of the following technologies allows for encrypted authentication of wireless clients over TLS?A . PEAPB . EAPC . WPA2D . RADIUSView AnswerAnswer: A Explanation: EAP by itself is only an authentication framework. PEAP (Protected Extensible...
Authentication fails for certain users after configuring the joining of the server-side SteelHead appliance to the domain as a read-only domain controller (RODC). What is the most likely issue?A . The users have local branch file serversB . There is an incorrect Short Domain Name (NETBIOS name)C . There’s an...
Which statement about IPv6RAGuardistrue?A . It does not offer protection in environments where IPv6 traffic is tunneledB . It cannot be configured on a switchport interface in the ingress direction.C . Packets that are dropped byIPv6RA Guard cannot be spanned.D . It is not supported in hardware when TCAM is...
What allows endpoints behind a NAT to discover the paths through which they will pass media?A . RTPB . TLSC . SNMPD . ICEView AnswerAnswer: D Explanation: Reference: https://www.cisco.com/c/en/us/td/docs/solutions/PA/ICE/icepa125.html
Which action prevent toll fraud in Cisco Unified Communications Manager?A . Configure ad hoc conference restriction.B . Implement toll fraud restriction in the Cisco IOS router.C . Allow off-net to off-net transfers.D . Implement route patterns in Cisco Unified CView AnswerAnswer: A
You need to configure the MFA settings for users who connect from the Boston office. The solution must meet the authentication requirements and the access requirements. What should you configure?A . named locations that have a private IP address rangeB . named locations that have a public IP address rangeC...