Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which configuration when applied to switch A accomplishes this task?
Refer to the exhibit. Which configuration when applied to switch A accomplishes this task? A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A...
Which password must an engineer use to enter the enable mode?
Refer to the exhibit. Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console,...
Which two steps will fulfill the request?
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)A . Configure the ports in an EtherChannel.B . Administratively shut down the ports.C . Configure the port type as access and place in...
What is the primary different between AAA authentication and authorization?
What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)
Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packets.B . It can identify different flows with a high level of granularity.C . It guarantees the delivery of high-priority packets.D . It can mitigate congestion by...
Which action is taken by the phone?
A Cisco IP phone receive untagged data traffic from an attached PC. Which action is taken by the phone?A . It allows the traffic to pass through unchanged.B . It drops the traffic.C . It tags the traffic with the default VLAE . It tags the traffic with the native...
Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router via Washington when the link between New York and Atlanta goes down?
Refer to Exhibit. An engineer is configuring the NEW York router to reach the Lot interface of the Atlanta router using interface Se0/0/0 as the primary path. Which two commands must be configured on the New York router so that it can reach the Lo1 interface of the Atlanta router...
Which action is taken by a switch port enabled for PoE power classification override?
Which action is taken by a switch port enabled for PoE power classification override?A . When a powered device begins drawing power from a PoE switch port a syslog message is generated.B . As power usage on a PoE switch port is checked data flow to the connected device is...
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)
Which two values or settings must be entered when configuring a new WLAN in the Cisco Wireless LAN Controller GUI? (Choose two)A . management interface settingsB . QoS settingsC . Ip address of one or more access pointsD . SSIDE . Profile nameView AnswerAnswer: DE