Which AP mode allows an engineer to scan configured channels for rogue access points?

Which AP mode allows an engineer to scan configured channels for rogue access points?A . snifferB . monitorC . bridgeD . localView AnswerAnswer: B

January 6, 2024 No Comments READ MORE +

Which deployment model meets this requirement?

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?A . AutonomousB . Mobility ExpressC . SD-Access wirelessD . Local modeView AnswerAnswer: B

January 6, 2024 No Comments READ MORE +

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?

When using TLS for syslog, which configuration allows for secure and reliable transportation of messages to its default port?A . logging host 10.2.3.4 vrf mgmt transport tcp port 6514B . logging host 10.2.3.4 vrf mgmt transport udp port 6514C . logging host 10.2.3.4 vrf mgmt transport tcp port 514D ....

January 6, 2024 No Comments READ MORE +

What are two benefits of YANG? (Choose two.)

What are two benefits of YANG? (Choose two.)A . It enforces the use of a specific encoding format for NETCONF.B . It collects statistical constraint analysis information.C . It enables multiple leaf statements to exist within a leaf list.D . It enforces configuration semantics.E . It enforces configuration constraints.View AnswerAnswer:...

January 6, 2024 No Comments READ MORE +

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?A . switch fabricB . VTEPC . VNIDD . host switchView AnswerAnswer: C Explanation: VXLAN uses an 8-byte VXLAN header that consists of a 24-bit VNID and a few reserved bits. The VXLAN header together with...

January 6, 2024 No Comments READ MORE +

Which explanation of this behavior is true?

Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...

January 6, 2024 No Comments READ MORE +

Which two threats does AMP4E have the ability to block? (Choose two.)

Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoSB . ransomwareC . Microsoft Word macro attackD . SQL injectionE . email phishingView AnswerAnswer: BC Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf

January 6, 2024 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

January 6, 2024 No Comments READ MORE +

Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...

January 6, 2024 No Comments READ MORE +

Drag and drop the characteristics from the left onto the routing protocols they describe on the right

DRAG DROP Drag and drop the characteristics from the left onto the routing protocols they describe on the right. View AnswerAnswer:

January 5, 2024 No Comments READ MORE +