Which type of wireless encryption is used for WPA2 in pre-shared key mode?
Which type of wireless encryption is used for WPA2 in pre-shared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...
Which state verifies the designated router is in the proper mode?
An engineer configured an OSPF neighbor as a designated router . Which state verifies the designated router is in the proper mode?A . ExchangeB . 2-wayC . FullD . InitView AnswerAnswer: C
Which design element is a best practice when deploying an 802.11b wireless infrastructure?
Which design element is a best practice when deploying an 802.11b wireless infrastructure?A . disabling TPC so that access points can negotiate signal levels with their attached wireless devicesB . setting the maximum data rate to 54 Mbps on the Cisco Wireless LAN ControllerC . allocating nonoverlapping channels to access...
What is the primary different between AAA authentication and authorization?
What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which password must an engineer use to enter the enable mode?
Refer to the exhibit . Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which IPv6 address block sends packets to a group address rather than a single address?
Which IPv6 address block sends packets to a group address rather than a single address?A . 2000::/3B . FC00::/7C . FE80::/10D . FF00::/8View AnswerAnswer: D Explanation: FF00::/8 is used for IPv6 multicast and this is the IPv6 type of address the question wants to ask. FE80::/10 range is used for...
Which type of address is the public IP address of a NAT device?
Which type of address is the public IP address of a NAT device?A . outside globalB . outsdwde localC . inside globalD . insride localE . outside publicF . inside publicView AnswerAnswer: C Explanation: NAT use four types of addresses: * Inside local address - The IP address assigned to...
Which two encoding methods are supported by REST APIs? (Choose two)
Which two encoding methods are supported by REST APIs? (Choose two)A . YAMLB . JSONC . EBCDICD . SGMLE . XMLView AnswerAnswer: BE Explanation: The Application Policy Infrastructure Controller (APIC) REST API is a programmatic interface that uses REST architecture. The API accepts and returns HTTP (not enabled by default)...