Which configuration change is required?
Refer to the exhibit. An engineer must create a configuration that executes the show run command and then terminates the session when user CCNP legs in. Which configuration change is required?A . Add the access-class keyword to the username command B. Add the access-class keyword to the aaa authentication command...
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)A . port flapping B. excess jitter C. misrouted network packets D. duplicate IP addresses E. bandwidth-related packet lossView AnswerAnswer: B,E
What is one difference between saltstack and ansible?
What is one difference between saltstack and ansible?A . SaltStack uses an API proxy agent to program Cisco boxes on agent mode, whereas Ansible uses a Telnet connection B. SaltStack uses the Ansible agent on the box, whereas Ansible uses a Telnet server on the box C. SaltStack is constructed...
What is the process of password checks when a login attempt is made to the device?
A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?A . A TACACS+server is checked first. If that check fail, a database is checked? B. A TACACS+server is checked first. If that check...
Which two mechanisms are available to secure NTP? (Choose two.)
Which two mechanisms are available to secure NTP? (Choose two.)A . IP prefix list-based B. IPsec C. TACACS-based authentication D. IP access list-based E. Encrypted authenticationView AnswerAnswer: D,E
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?A . least privilege B. fail-safe defaults C. economy of mechanism D. complete mediationView AnswerAnswer: B
What is one fact about Cisco SD-Access wireless network deployments?
What is one fact about Cisco SD-Access wireless network deployments?A . The access point is part of the fabric underlay B. The WLC is part of the fabric underlay C. The access point is part the fabric overlay D. The wireless client is part of the fabric overlayView AnswerAnswer: C
Drag and drop the wireless elements on the left to their definitions on the right
DRAG DROP Drag and drop the wireless elements on the left to their definitions on the right. View AnswerAnswer: Explanation: Chart, line chart Description automatically generated
Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting, Which method can a client use to authenticate to the network?A . text string B. username and password C. certificate D. RADIUS tokenView AnswerAnswer: A
What does the result confirm?
Refer to the exhibit. An engineer is troubleshooting a connectivity issue and executes a traceoute. What does the result confirm?A . The destination server reported it is too busy B. The protocol is unreachable C. The destination port is unreachable D. The probe timed outView AnswerAnswer: D Explanation: In Cisco...