Which 802.1x mode allows these actions?

A security administrator wants to profile endpoints and gain visibility into attempted authentications. Which 802.1x mode allows these actions?A . monitor modeB . high-security modeC . closed modeD . low-impact modeView AnswerAnswer: A Explanation: Monitor Mode Monitor Mode is a process, not just a command on a switch. The process...

April 12, 2018 No Comments READ MORE +

Which technologies should you recommend?

DRAG DROP You are designing an authentication strategy for a new server that has SQL Server 2014 installed. The strategy must meet the following business requirements: The account used to generate reports must be allowed to make a connection during certain hours only. Failed authentication requests must be logged. You...

April 12, 2018 No Comments READ MORE +

Which statements about One-to-One IP pool are true? (Choose two.)

Which statements about One-to-One IP pool are true? (Choose two.)A . It allows configuration of ARP replies.B . It allows fixed mapping of an internal address range to an external address range.C . It is used for destination NAE . It does not use port address translation.View AnswerAnswer: B,D

April 12, 2018 No Comments READ MORE +

What is the first thing that should be checked in the endpoint configuration settings?

A Cisco TelePresence EX Series desktop endpoint failed to register to a Cisco VCS. The SIP status shows "Failed: 403 Forbidden" in the endpoint's web interface. What is the first thing that should be checked in the endpoint configuration settings?A . Verify that the correct SIP authentication credentials have been...

April 12, 2018 No Comments READ MORE +

Which statement is true about the show cfs merge status name command?

Which statement is true about the show cfs merge status name command?A . In a successful merge, all switches in the fabric are shown separately.B . The command shows the complete Cisco Fabric Services region database.C . The merge master is selected based on the highest sWWN in the fabric.D...

April 12, 2018 No Comments READ MORE +

What feature is required to stop multicast traffic from being broadcasted on the access layer switches?

Multicast has been configured and enabled within an Enterprise network. PIM spare-mode has been enabled on all VLANs. What feature is required to stop multicast traffic from being broadcasted on the access layer switches?A . Multicast boundary filterB . PIM Dense-ModeC . IGMP snoopingD . Dynamic ARP inspectionView AnswerAnswer: C...

April 12, 2018 No Comments READ MORE +

If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated?

If a network engineer applies the command mac-address-table notification mac-move on a Cisco switch port, when is a syslog message generated?A . A MAC address or host moves between different switch ports.B . A new MAC address is added to the content-addressable memory.C . A new MAC address is removed...

April 12, 2018 No Comments READ MORE +

What two virtual hardware devices can be added to a powered on VM? (Choose two.)

What two virtual hardware devices can be added to a powered on VM? (Choose two.)A . Virtual disk connected using SCSI controllerB . Virtual disk connected using IDE controllerC . Network adapterD . Serial PortView AnswerAnswer: A,C

April 12, 2018 No Comments READ MORE +

Which two switch states are valid for 802.1w? (Choose two.)

Which two switch states are valid for 802.1w? (Choose two.)A . listeningB . backupC . disabledD . learningE . discardingView AnswerAnswer: D, E Explanation: Port States There are only three port states left in RSTP that correspond to the three possible operational states. The 802.1D disabled, blocking, and listening states...

April 12, 2018 No Comments READ MORE +

Fill in the blank: The __________ is used to obtain identification and security information about network users.

Fill in the blank: The __________ is used to obtain identification and security information about network users.A . User DirectoryB . User serverC . UserCheckD . User indexView AnswerAnswer: A

April 12, 2018 No Comments READ MORE +