In which two locations do you configure UDS contact lookups for Jabber clients? (Choose two.)

In which two locations do you configure UDS contact lookups for Jabber clients? (Choose two.)A . LDAP directoryB . enterprise parametersC . jabber-config.xmlD . service parametersE . directory profileF . user device profilesG . call pickup groupH . securityView AnswerAnswer: C,E

October 5, 2018 No Comments READ MORE +

What information is true about FabricPath switch-id?

FabricPath switch-id is 25 and load-balance is configured for L3/L4 and rotate amount is 14 byte. What information is true about FabricPath switch-id?A . FabricPath topology requires manual configuration of switch-id which has a range from 1 to 4095B . Every FabricPath must have a manually configured switch-id for it...

October 5, 2018 No Comments READ MORE +

Which of the following would MOST likely correct interference problems in the executive's office?

An administrator is receiving reports from an executive that the executive's wireless access point loses the signal frequently, even though the WAP is on the executive's desk. The office contains four other 802.11n access points. Which of the following would MOST likely correct interference problems in the executive's office?A ....

October 5, 2018 No Comments READ MORE +

Which IBM capability is used to control and manage traffic and SLAs in a hybnd cloud environment?

Which IBM capability is used to control and manage traffic and SLAs in a hybnd cloud environment?A . IBM DataPower GatewayB . IBM CastlronC . IBM StrongLoop CDD . IBM API ManagementView AnswerAnswer: A

October 5, 2018 No Comments READ MORE +

The functions provided by Huawei's monitoring system NetEco are: (multiple choice)

The functions provided by Huawei's monitoring system NetEco are: (multiple choice)A . Provide 2D, 3D data center view displayB . Support modular level/cabinet level view displayC . Support system power distribution view displayD . Provide a view creation tool for quick configuration viewView AnswerAnswer: ABCD

October 5, 2018 No Comments READ MORE +

Which Cisco AMP file disposition valid?

Which Cisco AMP file disposition valid?A . pristineB . malwareC . dirtyD . nonmaliciosView AnswerAnswer: D

October 5, 2018 No Comments READ MORE +

When users login to the Clientless SSLVPN using https://209.165.201.2/test, which group policy will be applied?

Scenario In this simulation, you have access to ASDM only. Review the various ASA configurations using ASDM then answer the five multiple choice questions about the ASA SSLVPN configurations. To access ASDM, click the ASA icon in the topology diagram. Note: Not all ASDM functionalities are enabled in this simulation....

October 5, 2018 No Comments READ MORE +

Which two actions should you perform?

Your network contains an Active Directory forest named contoso.com. The forest contains two domains named contoso.com and childl.contoso.com. The domains contain three domain controllers. The domain controllers are configured as shown in the following table. You need to ensure that the KDC support for claims, compound authentication, and kerberos armoring...

October 5, 2018 No Comments READ MORE +

How is on-premises web filtering supported?

A network consultant is designing an Internet Edge solution and is providing the details around the flows supporting a local Internet Proxy. How is on-premises web filtering supported?A . A cisco ASA uses an IPS module to inspect HTTP and HTTPS traffic.B . A Cisco ASA redirects HTTP and HTTPS...

October 5, 2018 No Comments READ MORE +

When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?

When performing threat hunting against a DNS server, which traffic toward the affected domain is considered a starting point?A . HTTPS trafficB . TCP trafficC . HTTP trafficD . UDP trafficView AnswerAnswer: D

October 5, 2018 No Comments READ MORE +