How are the different versions of IGMP compatible?
How are the different versions of IGMP compatible?A . IGMPv2 is compatible only with IGMPv1. B. IGMPv2 is compatible only with IGMPv2. C. IGMPv3 is compatible only with IGMPv3. D. IGMPv3 is compatible only with IGMPv1View AnswerAnswer: A
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?
Which TCP setting is tuned to minimize the risk of fragmentation on a GRE/IP tunnel?A . MTU B. Window size C. MRU D. MSSView AnswerAnswer: D Explanation: The TCP Maximum Segment Size (TCP MSS) defines the maximum amount of data that a host is willing to accept in a single...
Which explanation of this behavior is true?
Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...
Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.com B. cisco-capwap-controller.domain.com C. ap-manager.domain.com D. primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...
Which encryption hashing algorithm does NTP use for authentication?
Which encryption hashing algorithm does NTP use for authentication?A . SSL B. MD5 C. AES128 D. AES256View AnswerAnswer: B Explanation: An example of configuring NTP authentication is shown below: Router1(config)#ntp authentication-key 2 md5 itexamanswers Router1(config)#ntp authenticate Router1(config)#ntp trusted-key 2
Which configuration should the engineer use?
Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event...
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP server B. PKI server C. RADIUS server D. TACACS serverView AnswerAnswer: C
Which method of account authentication does OAuth 2.0 within REST APIs?
Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combination B. access tokens C. cookie authentication D. basic signature workflowView AnswerAnswer: B Explanation: The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API key,...
What does the cisco DNA REST response indicate?
What does the cisco DNA REST response indicate? A . Cisco DNA Center has the Incorrect credentials for cat3850- 1 B. Cisco DNA Center is unable to communicate with cat9000- 1 C. Cisco DNA Center has the incorrect credentials for cat9000- 1 D. Cisco DNA Center has the Incorrect credentials...
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?
Which technology provides a secure communication channel for all traffic at Layer 2 of the OSI model?A . MACsec B. IPsec C. SSL D. Cisco TrustsecView AnswerAnswer: A Explanation: MACsec, defined in 802.1AE, provides MAC-layer encryption over wired networks by using out- ofband methods for encryption keying. The MACsec Key...