Which configuration must be used?
A network engineer must configure a router to send logging messages to a syslog server based on these requirements: - uses syslog IP address: 10.10.10.1 - uses a reliable protocol - must not use any well-known TCP/UDP ports. Which configuration must be used?A . logging host 10.10.10.1 transport tcp port...
How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?
How does Cisco Trustsec enable more access controls for dynamic networking environments and data centers?A . classifies traffic based on advanced application recognitionB . uses flexible NetFlowC . classifies traffic based on the contextual identity of the endpoint rather than its IP address correctD . assigns a VLAN to the...
Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?
An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...
Which two GRE features are configured to prevent fragmentation? (Choose two.)
Which two GRE features are configured to prevent fragmentation? (Choose two.)A . TCP MSSB . PMTUDC . DF bit ClearD . MTU ignoreE . IP MTUF . TCP window sizeView AnswerAnswer: AE Explanation:
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?
If the noise floor is -90 dBm and wireless client is receiving a signal of -75 dBm, what is the SNR?A . 15B . 1.2C . -165D . .83View AnswerAnswer: A
What is a consideration when designing a Cisco SD-Access underlay network?
What is a consideration when designing a Cisco SD-Access underlay network?A . End user subnets and endpoints are part of the underlay network.B . The underlay switches provide endpoint physical connectivity for users.C . Static routing is a requirement,D . It must support IPv4 and IPv6 underlay networksView AnswerAnswer: B...
In cisco SD_WAN, which protocol is used to measure link quality?
In cisco SD_WAN, which protocol is used to measure link quality?A . OMPB . BFDC . RSVPD . IPsecView AnswerAnswer: B Explanation: The BFD (Bidirectional Forwarding Detection) is a protocol that detects link failures as part of the Cisco SD-WAN (Viptela) high availability solution, is enabled by default on all...
Which encryption hashing algorithm does NTP use for authentication?
Which encryption hashing algorithm does NTP use for authentication?A . SSLB . MD5C . AES128D . AES256View AnswerAnswer: B Explanation: An example of configuring NTP authentication is shown below: Router1(config)#ntp authentication-key 2 md5 itexamanswers Router1(config)#ntp authenticate Router1(config)#ntp trusted-key 2
Which HTTP JSON response does the python code output give?
Refer to the exhibit. Which HTTP JSON response does the python code output give?A . NameError: name 'json' is not definedB . KeyError 'kickstart_ver_str'C . 7.61D . 7.0(3)I7(4)View AnswerAnswer: D
What is the process of password checks when a login attempt is made to the device?
A network administrator applies the following configuration to an IOS device. What is the process of password checks when a login attempt is made to the device?A . A TACACS+server is checked first. If that check fail, a database is checked?B . A TACACS+server is checked first. If that check...