Enjoy 15% Discount With Coupon 15off

Monthly Archives - April 2023

Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?

While reviewing an existing network design, you are discussing the characteristics of different STP versions. Which protocol minimizes unicast flooding during a Topology Change Notification in a Layer 2 switched network with many VLANs?A . PVRSTP B. MST C. STP D. PVSTP+View AnswerAnswer: A

Read more...

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?

If a user reports a device lost or stolen, which portal should be used to prevent the device from accessing the network while still providing information about why the device is blocked?A . Client Provisioning B. Guest C. BYOD D. BlacklistView AnswerAnswer: D Explanation: https://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Borderless_Networks/Unified_Access/BYOD_Design_Guide/Managing_Lost_or_Stolen_Device.html#90273 The Blacklist identity group is...

Read more...

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?

Which Microsoft 365 feature can you use to restrict users from sending email messages that contain lists of customers and their associated credit card numbers?A . retention policies B. data loss prevention (DLP) policies C. conditional access policies D. information barriersView AnswerAnswer: B Explanation: Reference: https://docs.microsoft.com/en-us/microsoft-365/compliance/dlp-learn-about-dlp?view=o365-worldwide

Read more...