Which two mechanisms are available to secure NTP? (Choose two.)

Which two mechanisms are available to secure NTP? (Choose two.)A . IPsecB . IP prefix list-basedC . encrypted authenticationD . TACACS-based authenticationE . IP access list-basedView AnswerAnswer: CE Explanation: Reference: https://www.cisco.com/c/dam/en/us/td/docs/ios-xml/ios/bsm/configuration/xe­3se/3650/bsm-xe-3se-3650-book.html

July 14, 2020 No Comments READ MORE +

Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?

Refer to the exhibit. Based on the configuration in this WLAN security setting, which method can a client use to authenticate to the network?A . text stringB . username and passwordC . RADIUS tokenD . certificateView AnswerAnswer: A

July 14, 2020 No Comments READ MORE +

Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?

Refer to the exhibit. Which IP address becomes the active next hop for 192.168.102.0/24 when 192.168.101.2 fails?A . 192.168.101.10B . 192.168.101.14C . 192.168.101.6D . 192.168.101.18View AnswerAnswer: D

July 14, 2020 No Comments READ MORE +

Based on this interface configuration, what is the expected state of OSPF adjacency?

Based on this interface configuration, what is the expected state of OSPF adjacency? A . 2WAY/DROTHER on both routersB . not establishedC . FULL on both routersD . FULL/BDR on R1 and FULL/BDR on R2View AnswerAnswer: B

July 13, 2020 No Comments READ MORE +

In OSPF, which LSA type is responsible for pointing to the ASBR router?

In OSPF, which LSA type is responsible for pointing to the ASBR router?A . type 1B . type 2C . type 3D . type 4View AnswerAnswer: D

July 13, 2020 No Comments READ MORE +

Which statement about route targets is true when using VRF-Lite?

Which statement about route targets is true when using VRF-Lite?A . Route targets control the import and export of routes into a customer routing table.B . When BGP is configured, route targets are transmitted as BGP standard communities.C . Route targets allow customers to be assigned overlapping addresses.D . Route...

July 13, 2020 No Comments READ MORE +

Which command should be entered on the ports that are connected to Link2 to resolve the issue?

Refer to the exhibit. Link1 is a copper connection and Link2 is a fiber connection. The fiber port must be the primary port for all forwarding. The output of the show spanning-tree command on SW2 shows that the fiber port is blocked by spanning tree. An engineer enters the spanning-tree...

July 12, 2020 No Comments READ MORE +

Which statements are used for error handling in Python?

Which statements are used for error handling in Python?A . try/catchB . catch/releaseC . block/rescueD . try/exceptView AnswerAnswer: D

July 12, 2020 No Comments READ MORE +

Which privilege level is assigned to VTY users?

mobility express Refer to the exhibit. Which privilege level is assigned to VTY users?A . 1B . 7C . 13D . 15View AnswerAnswer: A

July 12, 2020 No Comments READ MORE +

Which EtherChannel mode must be configured on the switch to allow the WLC to connect?

To increase total throughput and redundancy on the links between the wireless controller and switch, the customer enabled LAG on the wireless controller. Which EtherChannel mode must be configured on the switch to allow the WLC to connect?A . ActiveB . PassiveC . OnD . AutoView AnswerAnswer: C Explanation: Reference:...

July 12, 2020 No Comments READ MORE +