When no spanning-tree bpdu guard enable is configured in f0/7, which is true? (There’s an exhibit that shows f0/7 receive BPDU.)

When no spanning-tree bpdu guard enable is configured in f0/7, which is true? (There’s an exhibit that shows f0/7 receive BPDU.)A . We have to configure shutdown and no shutdown.B . Have to use errdisable recoveryC . UDLD resetD . Network administrator must disable spanning-tree protocolView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?

Which utility can you use to troubleshoot and determine the timeline of packet changes in a data path within a Cisco firewall?A . packet tracerB . pingC . tracerouteD . SNMP walkView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

Which statement describes the process ID that is used to run OSPF on a router?

Which statement describes the process ID that is used to run OSPF on a router?A . It is globally significant and is used to represent the AS number.B . It is locally significant and is used to identify an instance of the OSPF database.C . It is globally significant and...

February 23, 2018 No Comments READ MORE +

Which option is a possible cause?

Q63.You have configured a site-to-site tunnel using static NAT with IKEv2. On one of the routers, you continuously see the IKE session establish and then get torn down with a message that indicates a policy mismatch. Which option is a possible cause?A . One router has its tunnel configured in...

February 22, 2018 No Comments READ MORE +

Which technologies should you recommend?

DRAG DROP You are designing an authentication strategy for a new server that has SQL Server 2014 installed. The strategy must meet the following business requirements: The account used to generate reports must be allowed to make a connection during certain hours only. Failed authentication requests must be logged. You...

February 22, 2018 No Comments READ MORE +

Which three options are available when applying a Customization Specification to an existing virtual machine? (Choose three.)

Which three options are available when applying a Customization Specification to an existing virtual machine? (Choose three.)A . Modify a specificationB . Select an existing specificationC . Import a specificationD . Create a specification from an existing specificationE . Create a specificationView AnswerAnswer: B,D,E

February 22, 2018 No Comments READ MORE +

Drag and Drop the NAT operations on the left to the correct sequential order on the right.

Drag and Drop the NAT operations on the left to the correct sequential order on the right. View AnswerAnswer:

February 22, 2018 No Comments READ MORE +

Which action would allow the VM to power on?

An administrator is attempting to power on a virtual machine with 32GB of memory. The operation fails with the following error: Could not power on VM: No space left on device Checking the space on the virtual machine’s datastore, there is 30GB free. Which action would allow the VM to...

February 22, 2018 No Comments READ MORE +

Which two actions are performed by the windows Unified Host Utilities 7.0 installation? (Choose two.)

Which two actions are performed by the windows Unified Host Utilities 7.0 installation? (Choose two.)A . Create the SVMs and the LUNs in ONTAPB . Set the parameters on the host to enable a connection to Netapp storage over SAN protocolsC . Create zoning on the switch between the host...

February 22, 2018 No Comments READ MORE +

Which statement about the authentication protocol used in the configuration is true?

Refer to Following: aaa new model tacacs-server host 1.1.1.1 single connection tacas-server key cisco123 Which statement about the authentication protocol used in the configuration is true?A . Authentication request contains username, encrypted password, NAS IP address, and port.B . Authentication and authorization requests are sent in a single open connection...

February 22, 2018 No Comments READ MORE +