Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)A . Enable NTP authentication.B . Verify the time zone.C . Disable NTP broadcasts.D . Specify the IP address of the NTP server.E . Set the NTP server...
What are two benefits of network automation? (Choose two)
What are two benefits of network automation? (Choose two)A . reduced operational costsB . reduced hardware footprintC . faster changes with more reliable resultsD . fewer network failuresE . increased network securityView AnswerAnswer: AC
Which prefix does Router 1 use for traffic to Host A?
Refer to the exhibit. Which prefix does Router 1 use for traffic to Host A?A . 10.10.10.0/28B . 10.10.13.0/25C . 10.10.13.144/28D . 10.10.13.208/29View AnswerAnswer: D Explanation: Host A address fall within the address range. However, if more than one route to the same subnet exist (router will use the longest...
Which IPv6 address type provides communication between subnets and cannot route on the Internet?
Which IPv6 address type provides communication between subnets and cannot route on the Internet?A . global unicastB . unique localC . link-localD . multicastView AnswerAnswer: B Explanation: A IPv6 Unique Local Address is an IPv6 address in the block FC00::/7. It is the approximate IPv6 counterpart of the IPv4 private...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...
What is the primary different between AAA authentication and authorization?
What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...
Which password must an engineer use to enter the enable mode?
Refer to the exhibit. Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console,...
What is the administrative distance of the route that will be installed in the routing table?
Router A learns the same route from two different neighbors, one of the neighbor routers is an OSPF neighbor and the other is an EIGRP neighbor. What is the administrative distance of the route that will be installed in the routing table?A . 20B . 90C . 110D . 115View...