Which two actions should you perform?
Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table. You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring...
A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?
A system administrator currently has two web server VMs on one host. Users are reporting that query searches within the site are slow. The system administrator notices that the host CPU is above the threshold. Which of the following should be completed?A . Migrate one web server to another host.B...
If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4?
Refer to the exhibit. If IEEE 802.1w is in use for this network design, what are two locations where spanning-tree root can be placed to ensure the least-disruptive Layer 2 failover for clients within VLANs 3 and 4? (Choose two.)A . Switch AB . Switch BC . Switch CD ....
When implementing Layer 3 MPLS VPNs on Cisco IOS/IOS XE PE routers, which PE-to-CE routing protocol requires a separate routing process to be created for each VRF?
When implementing Layer 3 MPLS VPNs on Cisco IOS/IOS XE PE routers, which PE-to-CE routing protocol requires a separate routing process to be created for each VRF?A . EIGRPB . RIPv2C . OSPFD . BGPView AnswerAnswer: C
Which of the following is the MOST important service management consequence of elastic capacity?
Which of the following is the MOST important service management consequence of elastic capacity?A . The need for better application developmentB . The need for better security managementC . The need for good performance monitoring and managementD . The need to improve the fulfillment and provisioning processView AnswerAnswer: C
Which two hosts are part of subnet 172.16.160.0/20? (Choose two.)
Which two hosts are part of subnet 172.16.160.0/20? (Choose two.)A . 172.16.168.0B . 172.16.176.1C . 172.16.160.255D . 172.16.160.0E . 172.16.176.255View AnswerAnswer: AC
Between the Cisco ASA configuration and the Cisco WSA configuration, what is true with respect to redirected ports?
The Web Cache Communication Protocol (WCCP) is a content-routing protocol that can facilitate the redirection of traffic flows in real time. Your organization has deployed WCCP to redirect web traffic that traverses their Cisco Adaptive Security Appliances (ASAs) to their Cisco Web Security Appliances (WSAs). The simulator will provide access...
On a WLAN with the WIDS function enabled, which of the following devices will NOT trigger rogue device alarms after they are identified as rogue devices? (Multiple Choice)
On a WLAN with the WIDS function enabled, which of the following devices will NOT trigger rogue device alarms after they are identified as rogue devices? (Multiple Choice)A . APB . Ad-hocC . Wireless bridgeD . STAView AnswerAnswer: BCD
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)
When implementing source-based remote-triggered black hole filtering, which two configurations are required on the edge routers that are not the signaling router? (Choose two.)A . A static route to a prefix that is not used in the network with a next hop set to the Null0 interfaceB . A static...
Which two statements regarding OSPFv2 or OSPFv3 authentication are correct? (Choose two.)
Which two statements regarding OSPFv2 or OSPFv3 authentication are correct? (Choose two.)A . OSPFv2 supports MD5 authentication.B . OSPFv2 supports MD5 or SHA authentication.C . OSPFv2 relies on the native security stack that uses IPsec.D . OSPFv3 supports MD5 authentication.E . OSPFv3 supports MD5 or SHA authentication.F . OSPFv3 relies...