Which of the following would need to be created to configure an application-layer inspection of SMTP traffic operating on port 2525?
Which of the following would need to be created to configure an application-layer inspection of SMTP traffic operating on port 2525?A . A class-map that matches port 2525 and applying an inspect ESMTP policy-map for that class in the globalinspection policyB . A policy-map that matches port 2525 and applying...
Which of the following character strings matches the regular expression 100$?
Which of the following character strings matches the regular expression 100$?A . 3100B . 100C . 1008D . 100 200View AnswerAnswer: B
Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button
HOTSPOT HOTSPOT Your company has an Office 365 subscription and uses Microsoft Lync Online. The environment includes the domains shown in the following image, and is configured as shown in the exhibit. (Click the Exhibit button.) Lync is not deployed in a hybrid configuration. An employee requires specific Lync communication...
Which of the following statements is NOT true about using Elastic IP Address (EIP) in EC2-Classic and EC2-VPC platforms?
Which of the following statements is NOT true about using Elastic IP Address (EIP) in EC2-Classic and EC2-VPC platforms?A . In the EC2-VPC platform, the Elastic IP Address (EIP) does not remain associated with the instance when you stop it.B . In the EC2-Classic platform, stopping the instance disassociates the Elastic IP...
Upon re-enabling DRS, how would the resource pool configuration have changed?
A cluster with two resource pools named RP-PROD and RP-DEV is configured based on custom requirements. A vSphere administrator temporarily disables DRS for this cluster. Upon re-enabling DRS, how would the resource pool configuration have changed? A. Both resource pools still exist, but their shares have been reverted to the...
What two interferers would likely be identified?
An 802.11g network is experiencing intermittent signal degradation and Spectrum Analyzer is being used to try and locate the problem. What two interferers would likely be identified? (Choose two.)A . multiple cell phonesB . microwave ovenC . FM RadioD . cordless phoneE . document scannerView AnswerAnswer: B, D
What is the effect of the ASA command crypto isakmp nat-traversal?
What is the effect of the ASA command crypto isakmp nat-traversal?A . It opens port 4500 only on the outside interface.B . It opens port 500 only on the inside interface.C . It opens port 500 only on the outside interface.D . It opens port 4500 on all interfaces that...
to use multiple path from distribution to core
to use multiple path from distribution to coreA . install IGPB . ECMPC . RSTP+D . HSRPView AnswerAnswer: B
What time out period should the user specify for connection draining?
A user has hosted an application on EC2 instances. The EC2 instances are configured with ELB and Auto Scaling. The application server session time out is 2 hours. The user wants to configure connection draining to ensure that all in-flight requests are supported by ELB even though the instance is being deregistered. What...
What must be done for Cisco WLC and Cisco WCS to communicate?
What must be done for Cisco WLC and Cisco WCS to communicate?A . The IP address and subnet mask of the Cisco WLC must be configured in the Cisco WCC . The IP address and subnet mask of the Cisco WCS must be configured in the Cisco WLE . The...