Which statements about application control are true? (Choose two.)

Which statements about application control are true? (Choose two.)A . Enabling application control profile in a security profile enables application control for all the traffic flowing through the FortiGate.B . It cannot take an action on unknown applications.C . It can inspect encrypted traffic.D . It can identify traffic from...

January 26, 2018 No Comments READ MORE +

What does the authoritative flag mean in regards to the NHRP information?

1.2/8 via 10.2.1.2, Tunnel1 created 00:00:12, expire 01:59:47 Type. dynamic, Flags: authoritative unique nat registered used NBMA address: 10.12.1.2 What does the authoritative flag mean in regards to the NHRP information?A . It was obtained directly from the next-hop server.B . Data packets are process switches for this mapping entry.C...

January 26, 2018 No Comments READ MORE +

What is the minimum amount of licensing that is required on Cisco Prime Infrastructure to support the desired wireless infrastructure?

A customer wants to use Cisco Prime Infrastructure to manage its current wireless infrastructure. The customer has 4 wireless controllers and 97 wireless access points. What is the minimum amount of licensing that is required on Cisco Prime Infrastructure to support the desired wireless infrastructure?A . 4 Lifecycle licenses and...

January 26, 2018 No Comments READ MORE +

Which command was used to produce the output for the inband packet statistics?

Refer to the exhibit. Which command was used to produce the output for the inband packet statistics?A . show hardware internal cpu-mac inband countersB . show system internal interface counters moduleC . show interface counters allView AnswerAnswer: A

January 26, 2018 No Comments READ MORE +

What domain can a VLAN be seen as ?

What domain can a VLAN be seen as ?A . collision domainB . broadcast domainC . management domainD . physical areaView AnswerAnswer: B

January 26, 2018 No Comments READ MORE +

What should you do?

DRAG DROP You manage virtual machines (VMs) that have been deployed in Azure. An application that runs on a VM has a memory leak. When memory usage exceeds 80 percent, multiple services must be restarted. You need to automate the VM maintenance. What should you do? To answer, drag the...

January 26, 2018 No Comments READ MORE +

Does this meet the goal?

In this section, you'll see one or more sets of questions with the same scenario and problem Each question presents a unique solution to the problem, and you must determine whether the solution meets the stated goals Any of the solutions might solve the problem. It is also possible that...

January 26, 2018 No Comments READ MORE +

Which two identity store options allow you to authorize based on group membership? (Choose two).

Which two identity store options allow you to authorize based on group membership? (Choose two).A . Lightweight Directory Access ProtocolB . RSA SecurID serverC . RADIUSD . Active DirectoryView AnswerAnswer: A,D

January 26, 2018 No Comments READ MORE +

Which command is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?

Which command is necessary to permit SSH or Telnet access to a cisco switch that is otherwise configured for these vty line protocols?A . transport type allB . transport output allC . transport preferred allD . transport input allView AnswerAnswer: D

January 26, 2018 No Comments READ MORE +

What should you do?

You need to modify the GPO prefix by IPAM. What should you do?A . Run theSet-lpamConfigurationcmdletB . ClickProvision the IPAM serverin Server Manager.C . ClickConfigure server discoveryin Server Manager.D . Run thelnvoke-lpamGpoProvisioningcmdletView AnswerAnswer: A

January 25, 2018 No Comments READ MORE +