Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?
Which switch feature determines validity based on IP-to-MAC address bindings that are stored in a trusted database?A . Dynamic ARP InspectionB . storm controlC . VTP pruningD . DHCP snoopingView AnswerAnswer: A
Which statement describes what happens if all VSL connections between the virtual switch members are lost?
Which statement describes what happens if all VSL connections between the virtual switch members are lost? A. Both virtual switch members cease to forward traffic. B. The VSS transitions to the dual active recovery mode, and both virtual switch members continue to forward traffic independently. C. The virtual switch members...
What is the purpose of a network mask?
What is the purpose of a network mask?A . It is used to identify the maximum hop count of a subnetwork.B . It is used to identify an IP address as either private or public.C . It is used to identify the network to which an IP address belongs.D ....
OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)
OSPF will be used as the IGP within a campus network. Which two things should you consider before deployment? (Choose two.)A . All areas need to connect back to area 0.B . The OSPF process number on each router should match.C . NSSA areas should be used when an area...
Which two statements about SAN zoning on Cisco Nexus switches are true? (Choose two.)
Which two statements about SAN zoning on Cisco Nexus switches are true? (Choose two.)A . Zoning is enforced by examining the destination ID field.B . Devices can only belong to one zone.C . Only one zone set can be activated at any time.D . A zone can only be a...
Which command will show the best paths that are installed in the PFE?
Which command will show the best paths that are installed in the PFE?A . show routeB . show route active-pathC . show route privateD . show route forwarding-tableView AnswerAnswer: D
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)
Which two features of Cisco Web Reputation tracking can mitigate web-based threats? (Choose Two)A . outbreak filterB . buffer overflow filterC . bayesian filterD . web reputation filterE . exploit filteringView AnswerAnswer: A, D Explanation: Cisco IronPort Outbreak Filters provide a critical first layer of defense against new outbreaks. With...
What are the default limits?
DRAG DROP DRAG DROP A company has an Office 365 tenant. You plan to implement Skype for Business Online for all users. You are evaluating client and conferencing policies. You need to identify the default limits for file transfers and users to configure the appropriate policies for users. What are...
Which of the following registry key Smith will check to find the above information?
Smith, an employee of a reputed forensic Investigation firm, has been hired by a private organization to investigate a laptop that is suspected to be involved in hacking of organization DC server. Smith wants to find all the values typed into the Run box in the Start menu. Which of...
The following description of ASM model and SSM model, which is right?(please select three correct answer)
The following description of ASM model and SSM model, which is right?(please select three correct answer)A . in SSM model, the receiver can know in advance the position of the multicast sourceB . in ASM model, the receiver will not be able to know in advance the position of the...