Which two methods are used to reduce the AP coverage area? (Choose two)

Which two methods are used to reduce the AP coverage area? (Choose two)A . Reduce channel width from 40 MHz to 20 MHzB . Disable 2.4 GHz and use only 5 GHz.C . Reduce AP transmit power.D . Increase minimum mandatory data rateE . Enable FastlaneView AnswerAnswer: C D

July 31, 2022 No Comments READ MORE +

Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?

Refer to the exhibit. Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?A . ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20B...

July 30, 2022 No Comments READ MORE +

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)A . port flappingB . excess jitterC . misrouted network packetsD . duplicate IP addressesE . bandwidth-related packet lossView AnswerAnswer: B, E

July 30, 2022 No Comments READ MORE +

Which data is properly formatted with JSON?

Which data is properly formatted with JSON? A) B) C) D) A . Option AB . Option BC . Option CD . Option DView AnswerAnswer: A

July 30, 2022 No Comments READ MORE +

Which interface or interface or interface are able to establish OSPF adjacency?

Refer to the exhibit. A network engineer configures OSPF and reviews the router configuration. Which interface or interface or interface are able to establish OSPF adjacency?A . GigabitEthemet0/1 and GigabitEthernet0/1.40B . only GigabitEthernet0/1C . only GigabttEthernet0/0D . Gigabit Ethernet0/0 and GigabitEthemet0/1View AnswerAnswer: C

July 30, 2022 No Comments READ MORE +

Which two threats does AMP4E have the ability to block? (Choose two.)

Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoSB . ransomwareC . Microsoft Word macro attackD . SQL injectionE . email phishingView AnswerAnswer: BC Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf

July 30, 2022 No Comments READ MORE +

Which protocol does REST API rely on to secure the communication channel?

Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...

July 30, 2022 No Comments READ MORE +

Refer to the exhibit

DRAG DROP Refer to the exhibit. Drag and drop the snippets into the RESTCONF request to form the request that returns this response Not all options are used View AnswerAnswer:

July 29, 2022 No Comments READ MORE +

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBondB . vSmartC . vManageD . PNP serverView AnswerAnswer: A

July 29, 2022 No Comments READ MORE +

Which two commands are needed to allow for full reachability between AS 1000 and AS 2000?

Refer to the exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)A . R1#network 192.168.0.0 mask 255.255.0.0B . R2#no network 10.0.0.0 255.255.255.0C . R2#network 192.168.0.0 mask 255.255.0.0D . R2#network 209.165.201.0 mask 255.255.192.0E . R1#no network 10.0.0.0 255.255.255.0View AnswerAnswer: B, C

July 29, 2022 No Comments READ MORE +