What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?

What security method is commonly used for VoIP handsets when the infrastructure does not support OKC or FT roaming?A . WPA2-Enterprise with EAP-TTLSB . WPA2-Enterprise with EAP-TLSC . WPA2-Enterprise with PEAPD . WPA2 -PersonalView AnswerAnswer: B

July 16, 2018 No Comments READ MORE +

What is the maximum number of cluster members?

Cisco TelePresence Video Communication Servers can be clustered to provide resiliency in the enterprise. What is the maximum number of cluster members?A . 2B . 3C . 6D . 7E . 15View AnswerAnswer: C

July 16, 2018 No Comments READ MORE +

In which two situations should you use in-band management? (Choose two.)

In which two situations should you use in-band management? (Choose two.)A . when management applications need concurrent access to the deviceB . when you require administrator access from multiple locationsC . when a network device fails to forward packetsD . when you require ROMMON accessE . when the control plane...

July 16, 2018 No Comments READ MORE +

Does this meet the goal?

Note: This question is part of a series of questions that present the same scenario. Each question in the series contains a unique solution that might meet the stated goals. Some question sets might have more than one correct solution, while others might not have a correct solution. After you...

July 16, 2018 No Comments READ MORE +

Which of the following is the MOST likely cause?

A new monitoring device is installed in the network that uses ping to determine whether critical network Internet routers are up. After three missing pings, the alarm reports the device is down. The device is now constantly reporting alarms, yet there are no reported Internet problems from users. Which of...

July 16, 2018 No Comments READ MORE +

Which three ESP fields can be encrypted during transmission? (Choose three.)

Which three ESP fields can be encrypted during transmission? (Choose three.)A . Security Parameter IndexB . Sequence NumberC . MAC AddressD . PaddingE . Pad LengthF . Next HeaderView AnswerAnswer: D,E,F

July 16, 2018 No Comments READ MORE +

On a Cisco Nexus 7000 Series router, which statement about HSRP and VRRP is true?

On a Cisco Nexus 7000 Series router, which statement about HSRP and VRRP is true?A . When VDCs are in use, only VRRP is supported.B . HSRP and VRRP both use the same multicast IP address with different port numbers.C . HSRP has shorter default hold and hello times.D ....

July 16, 2018 No Comments READ MORE +

How should you build the class constructor?

HOTSPOT You are developing an ASP.NET MVC application that authenticates a user by using claims-based authentication. The application must: You need to implement authentication. How should you build the class constructor? (To answer, select the appropriate option from the drop-down list in the answer area.) View AnswerAnswer: Explanation: http://garvincasimir.wordpress.com/2012/04/05/tutorial-mvc-application-using-azure-acs-and-forms-authentication-part-1/

July 16, 2018 No Comments READ MORE +

Which two options should you recommend?

You use a virtual network to extend an on-premises IT environment into the cloud. The virtual network has two virtual machines (VMs) that store sensitive data. The data must only be available using internal communication channels. Internet access to those VMs is not permitted. You need to ensure that the...

July 16, 2018 No Comments READ MORE +

The following protocols which support 2.4 GHz frequency band()?

The following protocols which support 2.4 GHz frequency band()? (Select 3 Answers)A . 802.11aB . 802.11bC . 802.11gD . 802.11nView AnswerAnswer: B C D

July 16, 2018 No Comments READ MORE +