How does a switch differ from a hub?
How does a switch differ from a hub?A . A switch does not induce any latency into the frame transfer time.B . A switch tracks MAC addresses of directly-connected devices.C . A switch operates at a lower, more efficient layer of the OSI model.D . A switch decreases the number...
Which migration strategy should you use?
Your company is planning to migrate to Microsoft Exchange Online. The company employs 1,000 people, each with a mailbox currently located on Exchange 2010 on-premises. You estimate that it will take a minimum of four weeks to migrate all mailboxes from on-premises Exchange to Exchange Online. The company has the...
Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device? (Select two.)
Which steps are required to use ClearPass as a TACACS+ Authentication server for a network device? (Select two.)A . Configure a TACACS Enforcement Profile on ClearPass for the desired privilege level.B . Configure a RADIUS Enforcement Profile on ClearPass for the desired privilege level.C . Configure ClearPass as an Authentication...
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?
In which VPN community is a satellite VPN gateway not allowed to create a VPN tunnel with another satellite VPN gateway?A . PentagonB . CombinedC . MeshedD . StarView AnswerAnswer: D Explanation: VPN communities are based on Star and Mesh topologies. In a Mesh community, there are VPN connections between...
Which three products are compatible with Digital Media Manager? (Choose three.)
Which three products are compatible with Digital Media Manager? (Choose three.)A . Media Delivery EngineB . Interactive Experience ClientC . Show and ShareD . CastE . Digital SignsF . Stadium Vision DirectorView AnswerAnswer: C, D, E
Which feature can you implement to reserve bandwidth for VoIP calls across the call path?
Which feature can you implement to reserve bandwidth for VoIP calls across the call path?A . PQB . CBWFQC . round robinD . RSVPView AnswerAnswer: D Explanation: When implemented on all nodes in the path, RSVP guarantees bandwidth for the call along the entire path for the entire duration of...
Which page on a Cisco VCS Expressway gives you all of this information?
You want to find a list of all recent call attempts on a Cisco VCS Expressway and the details of attempts to route these calls. You want to know if the requested address was found and if any transformations occurred. Which page on a Cisco VCS Expressway gives you all...
Which of the following Ethernet standards could the technician utilize?
A network technician must utilize multimode fiber to uplink a new networking device. Which of the following Ethernet standards could the technician utilize? (Select TWO).A . 1000Base-LRB . 1000Base-SRC . 1000Base-TD . 10GBase-LRE . 10GBase-SRF . 10GBase-TView AnswerAnswer: B,E Explanation: 1000BASE-SX is a fiber optic Gigabit Ethernet standard for operation...
What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?
What is the most effective method for testing roaming in relation to 802.11 VoIP handsets?A . Use the built-in roaming monitor built into all VoIP handsetsB . Use a protocol analyzer to capture the traffic generated when a laptop roamsC . Place a call with the handset and move around...
In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code modules on the VMs. Which of the following will meet this goal without requiring any hardware pass-through implementations?
A security architect is designing a new infrastructure using both type 1 and type 2 virtual machines. In addition to the normal complement of security controls (e.g. antivirus, host hardening, HIPS/NIDS) the security architect needs to implement a mechanism to securely store cryptographic keys used to sign code and code...