Which tool should you use?
Your network contains an Active Directory domain named contoso.com. The password policy for the domain is set to require a minimum password length of 10 characters. A user named User1 and a user named User2 work for the sales department. User1 is forced to create a domain password that has...
The 224.192.16.1 multicast IP address maps to which multicast MAC address?
The 224.192.16.1 multicast IP address maps to which multicast MAC address?A . 01-00-5E-C0-10-01B . 01-00-5E-40-10-01C . 01-00-5E-00-10-01D . 01-00-5E-C0-16-01View AnswerAnswer: B Explanation: Leastsignificant 23 bits of IP address and pre-pend 01-00-5E 224 ignore 192 less 128 becomes 64 = 40 16 = 10 1 = 01 01-00-5E-40-10-01
Which two statements describe overlay functionality in the Cisco ACI? (Choose two.)
Which two statements describe overlay functionality in the Cisco ACI? (Choose two.)A . Forwarding is not limited to or constrained by the encapsulation type or encapsulation network.B . Forwarding is limited to and constrained by the encapsulation type of encapsulation network.C . External identifiers are not local to the leaf...
Which setting should you configure?
HOTSPOT Your network contains an Active Directory domain named contoso.com. You have several Windows PowerShell scripts that execute when client computers start. When a client computer starts, you discover that it takes a long time before users are prompted to log on. You need to reduce the amount of time...
Which command enables IPv6 forwarding on a cisco router?
Which command enables IPv6 forwarding on a cisco router?A . ipv6 hostB . ipv6 unicast-routingC . ipv6 localD . ipv6 neighborView AnswerAnswer: B Explanation: Enabling IPv6 on Cisco IOS Software Technology http://www.ciscopress.com/articles/article.asp?p=31948&seqNum=4 The first step of enabling IPv6 on a Cisco router is the activation of IPv6 traffic forwarding to...
The Ajax Corporation is designing an IP telephony network using Cisco MCS 7845 Series servers, each one capable of supporting 7500 devices.
The Ajax Corporation is designing an IP telephony network using Cisco MCS 7845 Series servers, each one capable of supporting 7500 devices. The design must meet these requirements: - Be cost-effective - Support up to 7500 phones - Provide a minimal level of redundancyA . Two Cisco Unified Communications Manager...
What security model is dependent on security labels?
What security model is dependent on security labels?A . Discretionary access controlB . Label-based access controlC . Mandatory access controlD . Non-discretionary access controlView AnswerAnswer: C Explanation: With mandatory access control (MAC), the authorization of a subject's access to an object is dependant upon labels, which indicate the subject's clearance,...
What should you do?
Your company has a subscription to Azure. You configure your contoso.com domain to use a private Certificate Authority. You deploy a web site named MyApp by using the Shared (Preview) web hosting plan. You need to ensure that clients are able to access the MyApp website by using https. What...
Which statement about unicast frame forwarding on a switch is true?
Which statement about unicast frame forwarding on a switch is true?A . The TCAM table stores destination MAC addressesB . If the destination MAC address is unknown, the frame is flooded to every port that is configured in the same VLAN except on the port that it was received on.C...
Which of the following correctly describes NVGRE functionality?
Which of the following correctly describes NVGRE functionality?A . It allows to create physical leayer-2 topologies on physical layer-3 network.B . In NVGRE network VSID is used to identity tenant’s address spaceC . It allows to create physical leayer-2 topologies on virtual layer-3 network.D . In NVGRE network VSID does...