Which of the following should the administrator use to gain access to the secure network?
A network administrator needs to connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should the administrator use to gain access to the secure network?A . SSHB . VPNC . SFTPD . RDPView AnswerAnswer: B
Which of the following CANNOT be provided by a tool?
Which of the following CANNOT be provided by a tool?A . KnowledgeB . InformationC . WisdomD . DataView AnswerAnswer: C
What is a function of a call control solution?
What is a function of a call control solution?A . To make, monitor and maintain callsB . To provide an audio and video interface for the userC . To join 3 or more participants in a meeting.D . To schedule callsView AnswerAnswer: A
What are possible reasons for this problem?
Refer to the graphic. R1 is unable to establish an OSPF neighbor relationship with R3. What are possible reasons for this problem? (Choose two)A . All of the routers need to be configured for backbone Area 1B . R1 and R2 are the DR and BDR, so OSPF will not...
How are Cisco Unified CallManager location parameters used?
How are Cisco Unified CallManager location parameters used?A . Assign directory numbers to devices as they connect to the IP telephony network.B . Specify the bandwidth used for audio and video calls.C . Implement call admission control in a centralized call processing deployment.D . Provide alternate call routing when the...
Where can you change the clusterwide DSCP setting for Cisco Unified Communications Manager?
Where can you change the clusterwide DSCP setting for Cisco Unified Communications Manager?A . enterprise parametersB . service parametersC . enterprise phone configurationD . Ethernet configurationView AnswerAnswer: B
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?A . SnortB . NmapC . Cain & AbelD . NessusView AnswerAnswer: A
What should the engineer do to assign the two PCIe NICs to node 1?
An engineer is installing two PCIe NICs into an existing VRTX chassis. Node 1 has three PCIe cards assigned to it already. After installation, the engineer is unable to assign the two new NICs to node 1. What should the engineer do to assign the two PCIe NICs to node...
An administrator is installing a hypervisor and has provisioned a dedicated LAN connectivity, set the boot order, and is now rebooting the server to start installation. Which method is the administrator using to install the hypervisor?
An administrator is installing a hypervisor and has provisioned a dedicated LAN connectivity, set the boot order, and is now rebooting the server to start installation. Which method is the administrator using to install the hypervisor?A . host image mappingB . KVM consoleC . PXE installationD . virtual bootView AnswerAnswer:...
What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?
What needs to be configured to control unwanted transit traffic to not be routed to remote branches that have multiple WAN connections?A . route weightingB . route taggingC . route filteringD . route prioritisingView AnswerAnswer: C