Which two are best practices to implement profiling services in a distributed environment? (Choose two)
Which two are best practices to implement profiling services in a distributed environment? (Choose two)A . use of device sensor featureB . configuration to send syslogs to the appropriate profiler nodeC . netflow probes enabled on central nodesD . node-specific probe configurationE . global enablement of the profiler serviceView AnswerAnswer:...
Referring to the exhibit, to which routers will R3 advertise the BGP routes received from R2?
Click the Exhibit. Router1, in peer AS 65001, advertises routes to R2 using EBGP. R2 advertises the routes learned from R1 to R3 using IBGP. R3 is configured as a route reflector with routers R6 and R7 as clients. Referring to the exhibit, to which routers will R3 advertise the...
A Cisco TelePresence VCS displays this alarm: "Root password is set to default." How can this security warning be addressed?
A Cisco TelePresence VCS displays this alarm: "Root password is set to default." How can this security warning be addressed?A . Use the Cisco TelePresence VCS web user interface, choose Administration > User Settings, and change the root password.B . Use SSH to log in to the Cisco TelePresence VCS...
Which three multicast solutions should be enabled?
You are the lead IP/MPLS network designer of a service provider called XYZ. You are leading a design discussion regarding IPv6 implementation in the XYZ MPLS network, using MPLS 6PE/6VPE techniques. Currently, XYZ provides IPv4 multicast services over an MPLS network by using MVPN, and would like to provide parallel...
In an Eth-Trunk interface, traffic load balancing can be achieved by configuring different weights on each member link.
In an Eth-Trunk interface, traffic load balancing can be achieved by configuring different weights on each member link.A . TRUEB . FALSEView AnswerAnswer: A
What should you do?
You administer an Active Directory Domain Services environment. There are no certification authorities (CAs) in the environment. You plan to implement a two-tier CA hierarchy with an offline root CA. You need to ensure that the issuing CA is not used to create additional subordinate CAs. What should you do?...
Which two design considerations are important to achieve this task?
You are designing an IP fabric using EVPN with VXLAN and must ensure that all links between the leaf and spine nodes are used as efficiently as possible. Which two design considerations are important to achieve this task? (Choose two.)A . Load balancing is automatic in an IP fabric design.B...
Which tool should you use?
Your network contains an Active Directory domain named contoso.com. All servers run Windows Server 2012 R2. The domain contains a domain controller named DC1 that is configured as an enterprise root certification authority (CA). All users in the domain are issued a smart card and are required to log on...
Which of the following documents would a project manager create to make team meetings more effective?
Several team members report that meeting objectives are not being met. Which of the following documents would a project manager create to make team meetings more effective? (Choose two.)A . Create an SOW prior to each meeting and adhere to it.B . Create a meeting agenda prior to each meeting...
Which of the following should be the FIRST question the helpdesk asks?
A user calls the help desk and states that he was working on a spreadsheet and was unable to print it. However, his colleagues are able to print their documents to the same shared printer. Which of the following should be the FIRST question the helpdesk asks?A . Does the...