FHRP isolation between data center networks that are connected over an OTV network is a two-step process; the first prevents FHRP peering by filtering FHRP control packets across the overlay via a VLAN ACL. What is the second step?
FHRP isolation between data center networks that are connected over an OTV network is a two-step process; the first prevents FHRP peering by filtering FHRP control packets across the overlay via a VLAN ACL. What is the second step?A . Filter the FHRP MAC addresses that are being advertised by...
What is the resulting topology?
An engineer chose to design an architecture where distribution switches are in VSS and are connected to access switches using Multichassis Etherchannel. What is the resulting topology?A . LoopedB . RingC . HybridD . StarView AnswerAnswer: D
What should you do?
Your company has two cloud services named CS01 and CS02. You create a virtual machine (VM) in CS02 named Accounts. You need to ensure that users in CS01 can access the Accounts VM by using port 8080. What should you do?A . Create a firewall rule.B . Configure load balancing.C...
Why is the Mutual Legal Assistance Treaty (MLAT) a gateway for international cooperation?
Why is the Mutual Legal Assistance Treaty (MLAT) a gateway for international cooperation?A . They provide a legal basis for transmitting evidence that can be used for prosecution and judicial proceedingsB . They receive reports of suspicious transactions from financial institutions to disseminate to local Law enforcement and foreign FIUsC...
A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment
DRAG DROP A company would like to utilize its current infrastructure but wants to adopt virtualization to consolidate its environment. Currently, the infrastructure contains: • server with 2 x 8 cores CPUs and 96G8 of memory • backup LAN with a single physical switch • production LAN • sufficient datastore...
When RADIUS NAC and AAA Override are enabled for a WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)
When RADIUS NAC and AAA Override are enabled for a WLC on a Cisco ISE, which two statements about RADIUS NAC are true? (Choose two.)A . It returns an access-accept and sends the redirection URL for all users.B . It establishes secure connectivity between the RADIUS server and the Cisco...
Which two statements are true when performing a SPAN capture of traffic reaching the Supervisor CPU in order to troubleshoot control plane protocols in the tenant VDC? (Choose two.)
Which two statements are true when performing a SPAN capture of traffic reaching the Supervisor CPU in order to troubleshoot control plane protocols in the tenant VDC? (Choose two.)A . The destination interface will also receive control plane traffic from other VDCs.B . The SPAN configuration must be added to...
Which application works with Cisco NGFW to provide administrators powerful application and usage controls over mobile users?
Which application works with Cisco NGFW to provide administrators powerful application and usage controls over mobile users?A . TrustSecB . CloudlockC . StealthwatchD . Next Generation FirewallE . AnyConnectF . AMP Threat GridView AnswerAnswer: D
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?
A Cisco ASA is configured for TLS proxy. When should the security appliance force remote IP phones connecting to the phone proxy through the internet to be in secured mode?A . When the Cisco Unified Communications Manager cluster is in non-secure modeB . When the Cisco Unified Communications Manager cluster...
Random early detection (RED) is associated with which class of service component?
Random early detection (RED) is associated with which class of service component?A . classificationB . policingC . queuingD . schedulingView AnswerAnswer: D