Before they start adding client connections, what hardware change do you recommend?

A customer has eight X400 24GB RAM that supports 400 client connections today The customer plans to add 400 more clients in the next few months. They are looking at adding an A-Series node to the cluster to help with client connections. Before they start adding client connections, what hardware...

January 20, 2019 No Comments READ MORE +

What should you do?

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1. Server1 is configured as a VPN server. You need to configure Server1 to perform network address translation (NAT). What should you do?A . From Network Connections, modify the Internet Protocol Version 4 (TCP/IPv4) setting...

January 20, 2019 No Comments READ MORE +

Assuming that the two Cisco SAF Forwarders are adjacent to each other and that no SAF clients have been configured, which statement is true?

Refer to the exhibit. Assuming that the two Cisco SAF Forwarders are adjacent to each other and that no SAF clients have been configured, which statement is true?A .  The Cisco SAF Forwarders will not establish a neighbor relationship because the service-family external-client configuration is missing.B .  The Cisco SAF...

January 20, 2019 No Comments READ MORE +

What should you configure?

Note: This question is part of a series of questions that use the same or similar answer choices. An answer choice may be correct for more than one question in the series. Each question is independent of the other questions in this series. Information and details provided in a question...

January 20, 2019 No Comments READ MORE +

Which cmdlets should you run?

After the planned upgrade to Windows Server 2012, you restore a user account from the Active Directory Recycle Bin. You need to replicate the restored user account as quickly as possible. Which cmdlets should you run?A . Get-ADReplicationSite and Set-ADReplicationConnectionB . Get-ADReplicationAttributeMetadata and Compare-ObjectC . Get-ADReplicationUpToDatenessVectorTable and Set-ADReplicationSiteD . Get...

January 20, 2019 No Comments READ MORE +

What subnet mask would accommodate this network?

Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network?A . 255.255.255.192B . 255.255.255.224C . 255.255.255.240D...

January 20, 2019 No Comments READ MORE +

Which three CLI commands allow you to verify the correct VoIP dial-peer matching? (Choose three.)

Which three CLI commands allow you to verify the correct VoIP dial-peer matching? (Choose three.)A . debug ccsip messagesB . debug voip ccapi inoutC . debug dialpeer matchD . debug voip dialpeer inoutE . show dialplan numberView AnswerAnswer: B,D,E

January 20, 2019 No Comments READ MORE +

Which are two main features of FirePOWER Threat Defense? (Choose two.)

Which are two main features of FirePOWER Threat Defense? (Choose two.)A . Unify Images for more intuitive interface managementB . Provide malware detection score foe additional analyticsC . Deliver Data Loss Prevention through the virtual lockD . Offer intuitive interface including new management options and controlView AnswerAnswer: A, D

January 20, 2019 No Comments READ MORE +

Password management falls into which control category?

Password management falls into which control category?A .  CompensatingB .  DetectiveC .  PreventiveD .  TechnicalView AnswerAnswer: C Explanation: Password management is an example of preventive control. Proper passwords prevent unauthorized users from accessing a system. There are literally hundreds of different access approaches, control methods, and technologies, both in the physical...

January 20, 2019 No Comments READ MORE +

Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)

Which are two key Cisco benefits of the web threat-centric solution? (Choose two.)A . Data Loss Prevention with NGFWB . Endpoint device profiling with ISEC . E-mail encryption with CRESD . Malware blocking with AMPE . Rogue web application protection through CTAView AnswerAnswer: D, E

January 20, 2019 No Comments READ MORE +