Which set of action satisfy the requirement for multi-factor authentication?

Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...

March 1, 2022 No Comments READ MORE +

Which design element is a best practice when deploying an 802.11b wireless infrastructure?

Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devicesB . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating nonoverlapping channels to access...

March 1, 2022 No Comments READ MORE +

Which IP address is the source IP?

Refer to the exhibit. An engineer configured NAT translations and has verified that the configuration is correct. Which IP address is the source IP?A . 10.4.4.4B . 10.4.4.5C . 172.23.103.10D . 172.23.104.4View AnswerAnswer: D

March 1, 2022 No Comments READ MORE +

Which action do the switches take on the trunk link?

Refer to Exhibit. Which action do the switches take on the trunk link?A . The trunk does not form and the ports go into an err-disabled status.B . The trunk forms but the mismatched native VLANs are merged into a single broadcast domain.C . The trunk does not form, but...

March 1, 2022 No Comments READ MORE +

Which cloud service allows the organization to install its own operating system on a virtual machine?

An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?A . platform-as-a-serviceB . software-as-a-serviceC . network-as-a-serviceD . infrastructure-as-a-serviceView AnswerAnswer: D Explanation: Below are the 3 cloud supporting services cloud providers provide to customer: + SaaS...

March 1, 2022 No Comments READ MORE +

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?

Which QoS Profile is selected in the GUI when configuring a voice over WLAN deployment?A . BronzeB . PlatinumC . SilverD . GoldView AnswerAnswer: B Explanation: Cisco Unified Wireless Network solution WLANs support four levels of QoS: Platinum/Voice, Gold/Video, Silver/Best Effort (default), and Bronze/Background. Reference: https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_01010111.html

March 1, 2022 No Comments READ MORE +

What does router R1 use as its OSPF router-ID?

Refer to the exhibit. What does router R1 use as its OSPF router-ID?A . 10.10.1.10B . 10.10.10.20C . 172.16.15.10D . 192.168.0.1View AnswerAnswer: C Explanation: OSPF uses the following criteria to select the router ID:

March 1, 2022 No Comments READ MORE +

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)

Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)A . The switch must be running a k9 (crypto) IOS image.B . The ip domain-name command must be configured on the switch.C . IP routing must be enabled on the switch.D . A...

February 28, 2022 No Comments READ MORE +

Based on the LACP neighbor status, in which mode is the SW1 port channel configured?

Refer to the exhibit. Based on the LACP neighbor status, in which mode is the SW1 port channel configured?A . passiveB . mode onC . autoD . activeView AnswerAnswer: D Explanation: From the neighbor status, we notice the “Flags” are SP. “P” here means the neighbor is in Passive mode....

February 28, 2022 No Comments READ MORE +

Which configuration is needed to generate an RSA key for SSH on a router?

Which configuration is needed to generate an RSA key for SSH on a router?A . Configure the version of SSC . Configure VTY access.D . Create a user with a password.E . Assign a DNS domain name.View AnswerAnswer: D Explanation: In order to generate an RSA key for SSH, we...

February 28, 2022 No Comments READ MORE +