Which three operations can be performed within the Cisco Finesse IP Phone Age (IPPA)? (Choose three.)
Which three operations can be performed within the Cisco Finesse IP Phone Age (IPPA)? (Choose three.)A . A supervisor can use Finesse IPPA to act as an agent and accept calls.B . An agent can sign in to Finesse IPPA and initiate call recording.C . A supervisor can sign in...
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?
If a switch port goes into a blocked state only when a superior BPDU is received, what mechanism must be in use?A . STP root guardB . EtherChannel guardC . loop guardD . STP BPDU guardView AnswerAnswer: A Explanation: Root guard allows the device to participate in STP as long...
Referring to the exhibit, which zones use only World Wide Port Name Zoning?
Referring to the exhibit, which zones use only World Wide Port Name Zoning? A . BondB . JeffC . JakeD . ZeusView AnswerAnswer: D
You need to maximize performance of writes to each database without requiring changes to existing database tables
HOTSPOT You need to maximize performance of writes to each database without requiring changes to existing database tables. In the table below, identify the database setting that you must configure for each database. NOTE: Make only one selection in each column. Each correct selection is worth one point. View AnswerAnswer:...
When configuring security contexts on the Cisco ASA, which three resource class limits can be set using a rate limit? (Choose three.)
When configuring security contexts on the Cisco ASA, which three resource class limits can be set using a rate limit? (Choose three.)A . address translation rateB . Cisco ASDM session rateC . connections rateD . MAC-address learning rate (when in transparent mode)E . syslog messages rateF . stateful packet inspections...
Which encryption type should you use?
A company has client computers that run Windows 10. The client computer systems frequently use IPSec tunnels to securely transmit data. You need to configure the IPSec tunnels to use 256-bit encryption keys. Which encryption type should you use?A . 3DESB . DESC . RSAD . AESView AnswerAnswer: D Explanation:...
What 8-bit field exists in IP packet for QoS?
What 8-bit field exists in IP packet for QoS?A . Tos FieldB . DSCPC . IP PrecedenceD . CosView AnswerAnswer: A
EXHIBIT INCLUDED.
EXHIBIT INCLUDED. An exhibit with spanning-tree. Protocol used was IEEE. (Choose two.)A . The command spanning-tree mode IEEE was implemented.B . The spanning-tree mode is IEED . The protocol is Cisco proprietary.E . The protocol is supported per MEC basis.F . The protocol does not supported by switches that utilizes...
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic to pass on its default port? (Select TWO).A . 22B . 23C . 143D . 161E . 162F . 8080View AnswerAnswer: D,E
Which of the following is used to assign an IP address to a device?
Which of the following is used to assign an IP address to a device?A . DHCPB . NTPC . DNSD . RADIUSView AnswerAnswer: A