SNMPv3 provides which three security features? (Choose three)
SNMPv3 provides which three security features? (Choose three)A . DES 56-bit encryptionB . Encrypted user passwordC . Private community information that is exchanged out-of-bandD . Device hostname that is authenticated via AES algorithmE . Message integrityF . Authentication that is based on MD5 or SHA algorithmsView AnswerAnswer: A, E, F
Which option includes the two devices that can be connected when a Cisco Fabric Extender Transceiver is used?
Which option includes the two devices that can be connected when a Cisco Fabric Extender Transceiver is used?A . Server to Cisco Nexus 5548 SwitchB . Server to Cisco Nexus 5010 SwitchC . Cisco Nexus 2000 Series Fabric Extender to Cisco Nexus 5500 SwitchD . Server to Cisco Nexus 2000...
After the gateway is started, the device carries the Device Id and the password to access the OceanConnect. The OceanConnect authenticates the validity of the device and returns () if it is valid.
After the gateway is started, the device carries the Device Id and the password to access the OceanConnect. The OceanConnect authenticates the validity of the device and returns () if it is valid.A . 100 OKB . 200 OKC . 300 OKD . 500 OKView AnswerAnswer: B
What should you do?
HOTSPOT Your network contains an Active Directory domain named contoso.com. The domain contains four servers named Server1, Server2, Server3, and Server4 that run Windows Server 2016. Server1 and Server2 are nodes in a Hyper-V cluster named Cluster1. You have a highly available virtual machine named VM1. Server1 is the owner...
What should you do?
You administer a Microsoft SQL Server 2012 database. The database contains a customer table created by using the following definition: You need to ensure that the minimum amount of disk space is used to store the data in the customer table. What should you do?A . Implement row-level compression.B ....
Which three features does Cisco Unified Border Element provide when Cisco Unified CCE and Cisco Unified Customer Voice Portal are used? (Choose three.)
Which three features does Cisco Unified Border Element provide when Cisco Unified CCE and Cisco Unified Customer Voice Portal are used? (Choose three.)A . Silent Monitor inbound voice callsB . secure communication using flow around modeC . NAT for address hidingD . normalize SIP messages using SIP profilesE . record...
Which three components are required in a Cisco Unified CVP VXML "standalone" server deployment model? (Choose three.)
Which three components are required in a Cisco Unified CVP VXML "standalone" server deployment model? (Choose three.)A . Cisco Unified CVP Call StudioB . Cisco Unified CVP VXML ServerC . Cisco Unified CVP reporting serverD . load balancerE . ingress voice gatewayF . egress voice gatewayG . VRU peripheral gatewayView...
How well does the architecture (topology) meet the needs of the customer’s changing environment?
A data center has a traditional three-tier network design with routing at the distribution layer. The customer is vitalizing its servers and adding technologies such as live migration of virtual machines (VMs). How well does the architecture (topology) meet the needs of the customer’s changing environment?A . This topology is...
What should you do?
You have a server named Server1 that runs Windows Server 2012 R2. Server1 has a single volume that is encrypted by using BitLocker Drive Encryption (BitLocker). BitLocker is configured to save encryption keys to a Trusted Platform Module (TPM). Server1 is configured to perform a daily system image backup. The...
Which of the following statements pertaining to protection rings is false?
Which of the following statements pertaining to protection rings is false?A . They provide strict boundaries and definitions on what the processes that work within each ring can access.B . Programs operating in inner rings are usually referred to as existing in a privileged mode.C . They support the CIA...