Which three statements must be true for Cisco WLC to support roaming? (Choose three.)
Which three statements must be true for Cisco WLC to support roaming? (Choose three.)A . Controllers are in the same mobility group.B . Controllers operate in different LWAPP modes.C . ACLs are the same.D . Virtual interface IP addresses are the same.E . Controllers have different versions of code.F ....
What is the state and external identity of the R2 devices after initial synchronization has completed?
SRDF/Metro has been deployed. What is the state and external identity of the R2 devices after initial synchronization has completed?A . State: Read/Write Identity: R1 IdentityB . State: Read/Write Identity: Original IdentityC . State: Write Disabled Identity: Original IdentityD . State: Write Disabled Identity: R1 IdentityView AnswerAnswer: A Explanation: Reference:...
In Cisco ISE 1.3, where is BYOD enabled with dual-SSID onboarding?
In Cisco ISE 1.3, where is BYOD enabled with dual-SSID onboarding?A . client provisioning policyB . client provisioning resourcesC . BYOD portalD . guest portalView AnswerAnswer: D
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?
Which type of Cisco ASA access list entry can be configured to match multiple entries in a single statement?A . nested object-classB . class-mapC . extended wildcard matchingD . object groupsView AnswerAnswer: D Explanation: http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/objectgroups.html Information About Object Groups By grouping like objects together, you can use the object group...
Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.)
Which two functions are completely independent when implementing NAT64 over NAT-PT? (Choose two.)A . DNSB . NATC . port redirectionD . stateless translationE . session handlingView AnswerAnswer: AB Explanation: Work Address Translation IPv6 to IPv4, or NAT64, technology facilitates communication between IPv6only and IPv4-only hosts and networks (whether in a...
How does FortiGate look for a matching firewall policy to process traffic?
How does FortiGate look for a matching firewall policy to process traffic?A . From top to bottom, based on the sequence numbers.B . Based on best match.C . From top to bottom, based on the policy ID numbers.D . From lower to higher, based on the priority value.View AnswerAnswer: A
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?
A system with a simple logging mechanism has not been given much attention during development, this system is now being targeted by attackers, if the attacker wants to perform a new line injection attack, what will he/she inject into the log file?A . PlaintextB . Single pipe characterC . Multiple...
What must be enabled on the interface of a multicast-enabled device to support the Source Specific Multicast feature?
What must be enabled on the interface of a multicast-enabled device to support the Source Specific Multicast feature?A . IGMP version 3B . IGMP version 2C . IGMP version 1D . PIMView AnswerAnswer: A Explanation: IGMP is the Internet Engineering Task Force (IETF) standards track protocol used for hosts to...
Which setting will allow a virtual machine to have direct secure access to an RDM?
Which setting will allow a virtual machine to have direct secure access to an RDM?A . NIOCB . NPVC . NPIVD . CPUID MaskView AnswerAnswer: C
Which of the following security logs contains Logs of network and host-based security software?
Computer security logs contain information about the events occurring within an organization's systems and networks. Which of the following security logs contains Logs of network and host-based security software?A . Operating System (OS) logsB . Application logsC . Security software logsD . Audit logsView AnswerAnswer: C