Which network device does NTP authenticate?
Which network device does NTP authenticate?A . Only the time sourceB . Only the client deviceC . The firewall and the client deviceD . The client device and the time sourceView AnswerAnswer: A
When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access?
An administrator installed a Cisco ASA that runs version 9.1. You are asked to configure the firewall through Cisco ASDM. When you attempt to connect to a Cisco ASA with a default configuration, which username and password grants you full access?A . admin / adminB . asaAdmin / (no password)C...
Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?
Which option shows the correct traffic selectors for the child SA on the remote ASA, when the headquarter ASA initiates the tunnel?A . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.20.0/0-192.168.20.255/65535B . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 192.168.22.0/0-192.168.22.255/65535C . Local selector 192.168.22.0/0-192.168.22.255/65535 Remote selector 192.168.33.0/0-192.168.33.255/65535D . Local selector 192.168.33.0/0-192.168.33.255/65535 Remote selector 0.0.0.0/0...
Which way to achieve these goals?
A network engineer wants to limit the EIGRP query scope to avoid high CPU and memory utilization on low-end routers as well as limiting the possibility of a stuck-in-active routing event between HQ and branch offices. Which way to achieve these goals?A . Configure different Autonomous System number per each...
Which Windows PowerShell command should you run?
You deploy an Active Directory Federation Services (AD FS) 2.1 infrastructure. The infrastructure uses Active Directory as the attribute store. Some users report that they fail to authenticate to the AD FS infrastructure. You discover that only users who run third-party web browsers experience issues. You need to ensure that...
Which tool should you use?
You have a server named Server1 that runs Windows Server 2012 R2. When you install a custom Application on Server1 and restart the server, you receive the following error message: "The Boot Configuration Data file is missing some required information. File: BootBCD Error code: 0x0000034." You start Server1 by using...
When configuring class of service, what would you use to allocate bandwidth to a forwarding class?
When configuring class of service, what would you use to allocate bandwidth to a forwarding class?A . Buffer depthB . Transmit rateC . BandwidthD . SpeedView AnswerAnswer: B
Which supported and most efficient configuration would you recommend for this environment?
A company wants its x64 Linux backup data sent directly to ECS. Which supported and most efficient configuration would you recommend for this environment?A . Use a Networker storage node to receive x64 Linux NetWorker client data and send it to ECSB . Use a Cloud Boost appliance as a...
Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?
Which of the following is best defined as an administrative declaration by a designated authority that an information system is approved to operate in a particular security configuration with a prescribed set of safeguards?A . CertificationB . DeclarationC . AuditD . AccreditationView AnswerAnswer: D Explanation: Accreditation: is an administrative declaration by...
What is the best solution for this environment and these needs?
Refer to the exhibit. All connections between switches are 10 Gbps. Switch is an Intelligent Resilient Framework (IRF) group with two member. Switch2 is an IRF group with two members. Switch1 and Switch2 route all traffic. A network architect is designing a solution for a finance company. One of the...