Which command should be configured on the switch interface in order to provide the user with network connectivity?
Refer to the exhibit. An organization is using DHCP Snooping within their network. A user on VLAN 41 on a new switch is complaining that an IP address is not being obtained. Which command should be configured on the switch interface in order to provide the user with network connectivity?A...
What is the connection status in both cases?
A network engineer is deciding whether to use stateful or stateless failover when configuring two ASAs for high availability. What is the connection status in both cases?A . need to be reestablished with stateful failover and preserved with stateless failoverB . preserved with stateful failover and need to be reestablished...
What action would allow the attacker to gain access to machine 1 but not machine 2?
An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?A . sniffing the packets between the two hostsB . sending continuous...
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?
Which type of API is being used when a controller within a software-defined network architecture dynamically makes configuration changes on switches within the network?A . westbound APB . southbound APIC . northbound APID . eastbound APIView AnswerAnswer: B Explanation: Southbound APIs enable SDN controllers to dynamically make changes based on...
Which baseline form of telemetry is recommended for network infrastructure devices?
Which baseline form of telemetry is recommended for network infrastructure devices?A . SDNSB . NetFlowC . passive tapsD . SNMPView AnswerAnswer: D
Why is it important to have a patching strategy for endpoints?
Why is it important to have a patching strategy for endpoints?A . to take advantage of new features released with patchesB . so that functionality is increased on a faster scale when it is usedC . so that known vulnerabilities are targeted and having a regular patch cycle reduces risksD...
Which two cryptographic algorithms are used with IPsec? (Choose two)
Which two cryptographic algorithms are used with IPsec? (Choose two)A . AES-BACB . AES-ABCC . HMAC-SHA1/SHA2D . Triple AMC-CBCE . AES-CBCView AnswerAnswer: C,E Explanation: Cryptographic algorithms defined for use with IPsec include: + HMAC-SHA1/SHA2 for integrity protection and authenticity. + TripleDES-CBC for confidentiality + AES-CBC and AES-CTR for confidentiality. +...
How does Cisco Advanced Phishing Protection protect users?
How does Cisco Advanced Phishing Protection protect users?A . It validates the sender by using DKIC . It determines which identities are perceived by the senderD . It utilizes sensors that send messages securely.E . It uses machine learning and real-time behavior analytics.View AnswerAnswer: D Explanation: Reference: https://docs.ces.cisco.com/docs/advanced-phishing-protection
Which system performs compliance checks and remote wiping?
Which system performs compliance checks and remote wiping?A . MDMB . ISEC . AMPD . OTPView AnswerAnswer: A
What is the cause of this issue?
Refer to the exhibit. A network engineer is testing NTP authentication and realizes that any device synchronizes time with this router and that NTP authentication is not enforced. What is the cause of this issue?A . The key was configured in plain text.B . NTP authentication is not enabled.C ....