How does a switch differ from a hub?

How does a switch differ from a hub?A . A switch does not induce any latency into the frame transfer time.B . A switch tracks MAC addresses of directly-connected devices.C . A switch operates at a lower, more efficient layer of the OSI model.D . A switch decreases the number...

August 31, 2018 No Comments READ MORE +

Which migration strategy should you use?

Your company is planning to migrate to Microsoft Exchange Online. The company employs 1,000 people, each with a mailbox currently located on Exchange 2010 on-premises. You estimate that it will take a minimum of four weeks to migrate all mailboxes from on-premises Exchange to Exchange Online. The company has the...

August 31, 2018 No Comments READ MORE +

Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device? (Select two.)

Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device? (Select two.)A . Configure a TACACS Enforcement Profile on ClearPass for the desired privilege level.B . Configure a RADIUS Enforcement Profile on ClearPass for the desired privilege level.C . Configure ClearPass as an Authentication...

August 31, 2018 No Comments READ MORE +

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?

In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?A . PentagonB . CombinedC . MeshedD . StarView AnswerAnswer: D Explanation: VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN connections between...

August 31, 2018 No Comments READ MORE +

Which three products are compatible with Digital Media Manager? (Choose three.)

Which three products are compatible with Digital Media Manager? (Choose three.)A . Media Delivery EngineB . Interactive Experience ClientC . Show and ShareD . CastE . Digital SignsF . Stadium Vision DirectorView AnswerAnswer: C, D, E

August 31, 2018 No Comments READ MORE +

Which feature can you implement to reserve bandwidth for VoIP calls across the call path?

Which feature can you implement to reserve bandwidth for VoIP calls across the call path?A . PQB . CBWFQC . round robinD . RSVPView AnswerAnswer: D Explanation: When implemented on all nodes in the path, RSVP guarantees bandwidth for the call along the entire path for the entire duration of...

August 31, 2018 No Comments READ MORE +

Which page on a Cisco VCS Expressway gives you all of this information?

You want to find a list of all recent call attempts on a Cisco VCS Expressway and the details of attempts to route these calls. You want to know if the requested address was found and if any transformations occurred. Which page on a Cisco VCS Expressway gives you all...

August 31, 2018 No Comments READ MORE +

Which of the following Ethernet standards could the technician utilize?

A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).A . 1000Base-LRB . 1000Base-SRC . 1000Base-TD . 10GBase-LRE . 10GBase-SRF . 10GBase-TView AnswerAnswer: B,E Explanation: 1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation...

August 31, 2018 No Comments READ MORE +

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?

What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?A . Use the built-in roaming monitor built into all VoIP handsetsB . Use a protocol analyzer to capture the traffic generated when a laptop roamsC . Place a call with the handset and move around...

August 31, 2018 No Comments READ MORE +

In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?

A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code...

August 31, 2018 No Comments READ MORE +