How is 802.11 traffic handled in a fabric-enabled SSID?

How is 802.11 traffic handled in a fabric-enabled SSID?A . centrally switched back to WLC where the user traffic is mapped to a VXLAN on the WLCB . converted by the AP into 802.3 and encapsulated into VXLANC . centrally switched back to WLC where the user traffic is mapped...

March 17, 2024 No Comments READ MORE +

Which configuration achieves this goal?

Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600B . line vty 0 15 exec-timeoutC . line vty 01 5 exec-timeout 10 0D . line vty 0 4 exec-timeout 600View AnswerAnswer:...

March 17, 2024 No Comments READ MORE +

Drag and drop the characteristics from the left onto the orchestration tools they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the orchestration tools they describe on the right. View AnswerAnswer:

March 17, 2024 No Comments READ MORE +

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP serverB . PKI serverC . RADIUS serverD . TACACS serverView AnswerAnswer: C

March 16, 2024 No Comments READ MORE +

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....

March 16, 2024 No Comments READ MORE +

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?

Which command set configures RSPAN to capture outgoing traffic from VLAN 3 on interface GigabitEthernet 0/3 while ignoring other VLAN traffic on the same interface?A . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2 filter vlan 3B . monitor session 2 source interface gigabitethernet0/3 tx monitor session 2...

March 16, 2024 No Comments READ MORE +

Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...

March 16, 2024 No Comments READ MORE +

Which command ensures that SW3 receives frames only from VLAN 50?

Refer to exhibit. VLANs 50 and 60 exist on the trunk links between all switches All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?A . SW1(config)#vtp pruningB . SW3(config)#vtp mode transparentC ....

March 16, 2024 No Comments READ MORE +

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer:

March 16, 2024 No Comments READ MORE +

Which protocol does REST API rely on to secure the communication channel?

Which protocol does REST API rely on to secure the communication channel?A . TCPB . HTTPSC . SSHD . HTTPView AnswerAnswer: B Explanation: The REST API accepts and returns HTTP (not enabled by default) or HTTPS messages that contain JavaScript Object Notation (JSON) or Extensible Markup Language (XML) documents. You...

March 16, 2024 No Comments READ MORE +