Which action is considered a best practice for the Cisco ASA firewall?
Which action is considered a best practice for the Cisco ASA firewall?A . Use threat detection to determine attacksB . Disable the enable passwordC . Disable console loggingD . Enable ICMP permit to monitor the Cisco ASA interfacesE . Enable logging debug-trace to send debugs to the syslog serverView AnswerAnswer:...
During the process of the LPM (Live Partition Mobility), use the mobility of Power Enterprise Pools to activate, which of the following is true?
During the process of the LPM (Live Partition Mobility), use the mobility of Power Enterprise Pools to activate, which of the following is true?A . transfer activation to before the target system, the customer must notify IBC . target system must have available CoD environmental capacity.D . must purchase additional...
What are two effects of the given command?
Refer to the exhibit. What are two effects of the given command? (Choose two.)A . It configures authentication to use AES 256.B . It configures authentication to use MD5 HMAD . It configures authorization use AES 256.E . It configures encryption to use MD5 HMAG . It configures encryption to...
What is the reason the trunk does not form, even thought the proper cabling has been attached?
Refer to the exhibit. Switch port FastEthernet 0/24 on AlSwitch1 will be used to create an IEEE 802.1Qcomplaint trunk to another switch. Based on the output shown. What is the reason the trunk does not form, even thought the proper cabling has been attached?A . VLANs have not been created...
Which two actions should you perform?
A company is upgrading from Office 2010 to Office 365 ProPlus. The company plans to use the Telemetry Dashboard to identify document compatibility issues. You need to enable telemetry and immediately trigger data collection. Which two actions should you perform? Each correct answer presents part of the solution.A . Modify...
Which option is preferred when deploying OTV to more than three sites?
A network engineer is using OTV to connect six data centers. Which option is preferred when deploying OTV to more than three sites?A . Filter MAC address at the join interfaceB . Use multicast-enabled transportC . Use Unicast-only transportD . Avoid multihoming.View AnswerAnswer: B
What should you do?
You have a server named Server1 that runs Windows Server 2016. Server1 is a Hyper-V host that hosts a virtual machine named VM1. Server1 has three network adapter cards that are connected to virtual switches named vSwitch1, vSwitch2 and vSwitch3. You configure NIC Teaming on VM1 as shown in the...
What happens to the data on an instance if the instance reboots (intentionally or unintentionally)?
What happens to the data on an instance if the instance reboots (intentionally or unintentionally)?A . Data will be lostB . Data persistsC . Data may persist however cannot be sureView AnswerAnswer: B
What is the result of a successful RPF check?
What is the result of a successful RPF check?A . Packet is dropped because it arrived on the interface that used to forward the packet back to source.B . Packet is dropped because it arrived on the interface that used to forward the packet back to destination.C . Packet is...
Which feature is config by setting a variance that is at least 2 times the metric?
Which feature is config by setting a variance that is at least 2 times the metric?A . unequal cost load balancingB . path selectionC . equal cost load balancingD . path countView AnswerAnswer: A