Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)
Which four activities does the Key Server perform in a GETVPN deployment? (Choose four.)A . authenticates group membersB . manages security policyC . creates group keysD . distributes policy/keysE . encrypts endpoint trafficF . receives policy/keysG . defines group membersView AnswerAnswer: A, B, C, D
Fill in the blanks: ____ let you categorize your EC2 resources in different ways, for example, by purpose, owner, or environment.
Fill in the blanks: ____ let you categorize your EC2 resources in different ways, for example, by purpose, owner, or environment.A . wildcardsB . pointersC . TagsD . special filtersView AnswerAnswer: C
How can the administrator ensure the duplications run as soon as possible after the backup completes?
Storage life-cycle policy SLP1 is used to perform a backup and duplication. The backup is always a small 100MB backup. The master server host properties for SLP Parameters are set to the default values. How can the administrator ensure the duplications run as soon as possible after the backup completes?A...
What are two default Cisco IOS privilege levels? (Choose two.)
What are two default Cisco IOS privilege levels? (Choose two.)A . 0B . 1C . 5D . 7E . 10F . 15View AnswerAnswer: B,F
If the Link Fault alarm is connected to the minor relay and the FCS Bit Error Rate alarm is connected to the major relay, which commands will create an alarm profile called GigE with the alarms correctly mapped to the minor and major relays?
If the Link Fault alarm is connected to the minor relay and the FCS Bit Error Rate alarm is connected to the major relay, which commands will create an alarm profile called GigE with the alarms correctly mapped to the minor and major relays?A . Switch(config)#alarm profile GigE Switch(config-alarm-prof)#alarm 1 4...
Which are two main features of FirePOWER Threat Defense? (Choose two.)
Which are two main features of FirePOWER Threat Defense? (Choose two.)A . Unify Images for more intuitive interface managementB . Provide malware detection score foe additional analyticsC . Deliver Data Loss Prevention through the virtual lockD . Offer intuitive interface including new management options and controlView AnswerAnswer: A, D
Which 802.1x command is needed for ACL to be applied on a switch port?
Which 802.1x command is needed for ACL to be applied on a switch port?A . dot1x system-auth-controlB . dot1x pae authenticatorC . authentication port-control autoD . radius-server vsa send authenticationE . aaa authorization network default group radiusView AnswerAnswer: D
On Cisco Unified Communications Manager, where can you change the softkey templates from your IP phone?
On Cisco Unified Communications Manager, where can you change the softkey templates from your IP phone?A . Cisco Unified Communications Manager Serviceability > Device > Device Settings > Softkey Templates.B . Cisco Unified Communications Manager Administration > Device > Device Settings > Softkey Templates.C . Cisco Unified Communications Manager Administration...
What is the most efficient method to accomplish this task?
A technician wants to move memory from a few older systems into a newer system. What is the most efficient method to accomplish this task?A . Power down all of the older servers to physically check the memory Move any matching memory to the new serverB . Use iDRAC to...
Which markup segments should you include in Target 1, Target 2, Target 3, Target 4 and Target 5 to implement the startup task?
DRAG DROP You need to ensure that the transcode.exe utility is installed before the worker role starts. You have the following markup: Which markup segments should you include in Target 1, Target 2, Target 3, Target 4 and Target 5 to implement the startup task? To answer, drag the appropriate...