Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)
Which accounting notices are used to send a failed authentication attempt record to a AAA server? (Choose two.)A . start-stopB . stop-recordC . stop-onlyD . stopView AnswerAnswer: A,C
In which of the following states do BGP peers refuse to initiate or accept connection requests?
In which of the following states do BGP peers refuse to initiate or accept connection requests?A . EstablishedB . IdleC . ActiveD . OpenConfirmView AnswerAnswer: B
Which of the following best describes a purpose of the Gap Analysis technique?
Which of the following best describes a purpose of the Gap Analysis technique?A . To catch errors in a project architecture earlyB . To guide decision making throughout the enterpriseC . To help identify and understand business requirementsD . To highlight shortfalls between the baseline and target architecturesE . To...
Which cloud characteristic is used to describes the sharing of physical resource between various entities ?
Which cloud characteristic is used to describes the sharing of physical resource between various entities ?A . ElasticityB . Ubiquitous accessC . MultitenancyD . ResiliencyView AnswerAnswer: C
To configure AAA, you first need to define the RADIUS server, RADIUS server defined manner as follows:
To configure AAA, you first need to define the RADIUS server, RADIUS server defined manner as follows: [Huawei] radius-server template EXAM [Huawei-radius-EXAM] radius-server shared-key cipher HUAwei123 [Huawei-radius-EXAM] radius-server authentication 10.7.66.66 1812 [Huawei-radius-EXAM] radius-server authorization 10.7.66.66 1812 [Huawei-radius-EXAM] radius-server accounting 10.7.66.66 1813 [Huawei-radius-EXAM] radius-server retransmit 2A . TrueB . FalseView AnswerAnswer:...
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?
If a file (readme.txt) on a hard disk has a size of 2600 bytes, how many sectors are normally allocated to this file?A . 4 SectorsB . 5 SectorsC . 6 SectorsD . 7 SectorsView AnswerAnswer: C
Which two reasons explain why a server on VLAN 10 is unable to join a multicast stream that originates on VLAN 20? (Choose two.)
Which two reasons explain why a server on VLAN 10 is unable to join a multicast stream that originates on VLAN 20? (Choose two.)A . IGMP snooping and mrouter are not enabled on VLAN 10.B . VLAN 20 has no IGMP snooping querier defined and VLAN 10 has no mrouter.C...
How can this be done?
ESXi hosts with 10Gbps network cards are attached to a distributed switch. The administrator has upgraded to NIOC3 and wants to allow vMotion traffic to use as much bandwidth as possible but must ensure that other services always have sufficient bandwidth. How can this be done?A . Configure shares on...
Which port authentication host mode can be used to achieve this configuration?
A network security engineer is considering configuring 802.1x port authentication such that a single host is allowed to be authenticated for data and another single host for voice. Which port authentication host mode can be used to achieve this configuration?A . single-hostB . multihostC . multauthD . multidomainView AnswerAnswer: D
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)
Which countermeasures can mitigate ARP spoofing attacks? (Choose two.)A . Port securityB . DHCP snoopingC . IP source guardD . Dynamic ARP inspectionView AnswerAnswer: B,D