Which two statements about Cisco Discovery Protocol are true? (Choose two)
Which two statements about Cisco Discovery Protocol are true? (Choose two)A . It is used to initiate a VTP server and cient relationshipB . It uses SNMP to share device information to an external serverC . It runs on the network layer and the data link layer.D . It runs...
Which is required by vCenter Converter Standalone to convert a physical Red Hat Enterprise Linux 7 machine to a virtual machine?
Which is required by vCenter Converter Standalone to convert a physical Red Hat Enterprise Linux 7 machine to a virtual machine?A . The Linux machine must be powered off.B . The Linux machine must have the SSH daemon started.C . The Linux machine must use a static IP address.D ....
On a server running the 3.4.50-11 Linux kernel, which file in the /boot directory contains the kernel configuration parameters?
On a server running the 3.4.50-11 Linux kernel, which file in the /boot directory contains the kernel configuration parameters?A . config-linux-3.4.50-11B . config-3.4.50-11C . system-3.4.50-11D . vmlinuz-3.4.50-11E . rc.config-3.4.50-11View AnswerAnswer: B
What is the status of Ethernet 1/5 interface for FCoE functionality?
Ethernet interface 1/5 on Cisco Nexus 5548 is connected to Cisco UCS C220 rack server. What is the status of Ethernet 1/5 interface for FCoE functionality?A . Interface reset on Ethernet 1/5 is preventing the FCoE connection from coming upB . MTU size of 1500 on Ethernet interface 1/5 needs...
Which two ports must be open on a VMware vCenter server to allow communications to a Cisco Nexus 1000V Series Switch? (Choose two)
Which two ports must be open on a VMware vCenter server to allow communications to a Cisco Nexus 1000V Series Switch? (Choose two)A . 80B . 443C . 21D . 2010E . 20View AnswerAnswer: AB
Which system should be used to address policy enforcement at the distribution layer?
A network engineer is implementing virtualization into the enterprise network. Which system should be used to address policy enforcement at the distribution layer?A . Cisco IOS based firewallB . multilayer switchesC . integrated firewall servicesD . identity services engineE . intrusion protection systemsView AnswerAnswer: C
Which of the following should be implemented to remediate the above issues?
After embracing a BYOD policy, a company is faced with new security challenges from unmanaged mobile devices and laptops. The company’s IT department has seen a large number of the following incidents: -Duplicate IP addresses -Rogue network devices -Infected systems probing the company’s network Which of the following should be...
Which route will be selected when trying to reach 10.20.30.254?
View the example routing table. Which route will be selected when trying to reach 10.20.30.254?A . 10.20.30.0/26 [10/0] via 172.20.168.254, port2B . The traffic will be dropped because it cannot be routed.C . 10.20.30.0/24 [10/0] via 172.20.167.254, port3D . 0.0.0.0/0 [10/0] via 172.20.121.2, port1View AnswerAnswer: C
Which two actions should you perform?
You develop a Windows Store application that has a web service backend. You plan to use the Azure Active Directory Authentication Library to authenticate users to Azure Active Directory (Azure AD) and access directory data on behalf of the user. You need to ensure that users can log in to...
Which interface does the router use if traffic is sent to the 99.0.0.1 destination?
0.0.0/26 *[Static/5] 00:00:11 >to 10.1.4.2 via ge-0/0/4.0 -- Exhibit -- In the exhibit, there are four static routes that route traffic through different interfaces. Which interface does the router use if traffic is sent to the 99.0.0.1 destination?A . ge-0/0/1B . ge-0/0/2C . ge-0/0/3D . ge-0/0/4View AnswerAnswer: D