Which of the following should the technician perform?

A technician is installing a surveillance system for a home network. The technician is unsure which ports need to be opened to allow remote access to the system. Which of the following should the technician perform?A . Disable the network based firewallB . Implicit deny all traffic on networkC ....

November 15, 2018 No Comments READ MORE +

Which feature could be used in the ?MPLS VPN service provider network to support the design requirement by ensuring that during normal operation, intersite traffic will only use the MPLS VPN service and not the old Frame Relay service?

Refer to the exhibit. An enterprise is migrating its single-area OSPF network from a Frame Relay WAN service to an MPLS L3VPN service. Frame Relay will remain in only a few sites that require increased resiliency via two different WAN connections. Which feature could be used in the ?MPLS VPN...

November 15, 2018 No Comments READ MORE +

Which port is used for this?

Full synchronization between cluster members is handled by Firewall Kernel. Which port is used for this?A . UDP port 265B . TCP port 265C . UDP port 256D . TCP port 256View AnswerAnswer: D Explanation: Synchronization works in two modes: Full Sync transfers all Security Gateway kernel table information from...

November 15, 2018 No Comments READ MORE +

Which are two main use cases for Clientless SSL VPN? (Choose two.)

Which are two main use cases for Clientless SSL VPN? (Choose two.)A . In kiosks that are part of a shared environmentB . When the users do not have admin rights to install a new VPN clientC . When full tunneling is needed to support applications that use TCP, UDP,...

November 15, 2018 No Comments READ MORE +

After logging in as the root user, what is the next command you must enter?

You want to log in to the router and make a configuration change. After logging in as the root user, what is the next command you must enter?A . enableB . configureC . editD . cliView AnswerAnswer: D

November 15, 2018 No Comments READ MORE +

What are all the possible security groups that RDS uses?

You need to set up a high level of security for an Amazon Relational Database Service (RDS) you have just built in order to protect the confidential information stored in it. What are all the possible security groups that RDS uses?A .  DB security groups, VPC security groups, and EC2 security groups.B ....

November 15, 2018 No Comments READ MORE +

Looking at the configuration of the switch, what could be the possible issue?

Refer to the exhibit. A customer has opened a case with Cisco TAC reporting an issue that clients are unable to connect to the network using the guest account. Looking at the configuration of the switch, what could be the possible issue?A . CTS is incorrectly configuredB . MAB should...

November 15, 2018 No Comments READ MORE +

In the 'Detailed' monitoring data available for your Amazon EBS volumes, Provisioned lOPS volumes automatically send __ minute metrics to Amazon CloudWatch.

In the 'Detailed' monitoring data available for your Amazon EBS volumes, Provisioned lOPS volumes automatically send __ minute metrics to Amazon CloudWatch.A . 3B . 1C .  5D .  2View AnswerAnswer: B

November 15, 2018 No Comments READ MORE +

In the template mode of the MA5680T, where should the integration of tcont and gemport be configured?

In the template mode of the MA5680T, where should the integration of tcont and gemport be configured?A . ont-srvpmfileB . ont-linepmfileC . ont-profileD . dba-profileView AnswerAnswer: B

November 15, 2018 No Comments READ MORE +

What is the result?

A network engineer executes the “ipv6 flowset” command. What is the result?A . Flow-label marking in 1280-byte or larger packets is enabled.B . Flow-set marking in 1280-byte or larger packets is enabledC . IPv6 PMTU is enabled on the router.D . IPv6 flow control is enabled on the router.View AnswerAnswer:...

November 15, 2018 No Comments READ MORE +