What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?

What is the next action taken by the Cisco NAC Appliance after it identifies a vulnerability on a client device?A . denies the client network resource accessB . repairs the effected devicesC . generates a Syslog messageD . permits the client but limits to guest access View Answer Answer: A Explanation: https://www.cisco.com/c/en/us/td/docs/security/nac/appliance/configuration_guide/47/cam/47cam-book/m_intro.html "Cisco NAC...

Continue reading

The direction of the flow of multicast traffic is based on which protocol?

The direction of the flow of multicast traffic is based on which protocol?A . PIMB . IGMPC . underlying IGPD . MSDP View Answer Answer: C Explanation: https://www.cisco.com/c/en/us/td/docs/ios/solutions_docs/ip_multicast/White_papers/mcst_ovr.html "Reverse Path Forwarding (RPF) PIM uses the unicast routing information to create a distribution tree along the reverse path from the receivers towards the source. The...

Continue reading

Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment?

Which option is a primary requirement for the deployment of an IPv6-enabled network via the native method (dual-stack model) within the enterprise campus environment?A . hardware-based switching support for IPv6 forwarding on all campus switchesB . restriction of IPv6-enabled devices to the core layerC . manual implementation of tunneling between IPv6-incompatible devices in an...

Continue reading
  • Sign up
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
We do not share your personal details with anyone.