Which types of access control lists can be divided into? (Multiple Choice)

Which types of access control lists can be divided into? (Multiple Choice)A . Basic access control listB . Advanced access control listC . Layer 2 ACLD . User-defined ACLsView AnswerAnswer: ABCD

March 21, 2018 No Comments READ MORE +

Which network mask meets this requirement?

You have been assigned the /24 network and need to segment it into at least 60 subnets. Which network mask meets this requirement?A . /27B . /28C . /29D . /30View AnswerAnswer: D

March 21, 2018 No Comments READ MORE +

Which two security features are only supported on the Cisco Nexus 7000 Series Switches? (Choose two.)

Which two security features are only supported on the Cisco Nexus 7000 Series Switches? (Choose two.)A . IP source guardB . traffic storm controlC . CoPPD . DHCP snoopingE . Dynamic ARP InspectionF . NACView AnswerAnswer: B, F Explanation: A traffic storm occurs when packets flood the LAN, creating excessive...

March 21, 2018 No Comments READ MORE +

Which is the VDP appliance available storage configuration maximum?

Which is the VDP appliance available storage configuration maximum?A . 2 TBB . 62 TBC . 8 TBD . 4 TBView AnswerAnswer: C

March 21, 2018 No Comments READ MORE +

What are two ways to configure the switch ID for Cisco FabricPath? (Choose two.)

What are two ways to configure the switch ID for Cisco FabricPath? (Choose two.)A . manually by using the vPC domain configurationB . manually by using global configuration modeC . dynamically by using the POAP protocolD . dynamically by using the DRAP protocolE . dynamically by using the SNMPv2 protocolView...

March 21, 2018 No Comments READ MORE +

What are two requirements for configuring SAN device aliases? (Choose two.)

What are two requirements for configuring SAN device aliases? (Choose two.)A . The aliases are independent between fabric nodes.B . The aliases can be assigned to WWPN and WWND . The aliases can be assigned to WWNN only.E . The aliases can be assigned to WWPN only.F . The aliases...

March 21, 2018 1 Comment READ MORE +

When a company's internal DNS is down, how can a SIP Remote Worker client still register with the IP Office through the Wi-Fi connection?

When a company's internal DNS is down, how can a SIP Remote Worker client still register with the IP Office through the Wi-Fi connection?A . The Internet router/firewall will proxy the IP Office IP address.B . With the FQDN and port forwarding router the Internet DNS can work.C . DHCP...

March 21, 2018 No Comments READ MORE +

When using the CLI command eping, configured for auto-anchor mobility wireless guest access, which type of packet is tested?

When using the CLI command eping, configured for auto-anchor mobility wireless guest access, which type of packet is tested?A . data packetsB . mobility unencrypted packetsC . mobility encrypted packetsD . SNMP control packetsE . NTP control packetsView AnswerAnswer: A

March 21, 2018 No Comments READ MORE +

How can FirePOWER block malicious email attachments?

How can FirePOWER block malicious email attachments?A . It forwards email requests to an external signature engine.B . It scans inbound email messages for known bad URLs.C . It sends the traffic through a file policy.D . It sends an alert to the administrator to verify suspicious email messages.View AnswerAnswer:...

March 21, 2018 No Comments READ MORE +

What will the router consider the most reliable information about the path to that network?

A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?A . an OSPF update for network 192.168.0.0/16B . a static route to network 192.168.10.0/24C . a static route to network 192.168.10.0/24 with a local serial...

March 21, 2018 No Comments READ MORE +