When a wireless guest network is implemented using auto-anchor mobility in a controller-based wireless network, which controller is responsible for a guest client's IP address and their security configuration?

When a wireless guest network is implemented using auto-anchor mobility in a controller-based wireless network, which controller is responsible for a guest client's IP address and their security configuration?A . any controller that supports the same VLANB . foreign controllerC . anchor controllerD . master controllerE . RF group master...

March 24, 2018 No Comments READ MORE +

Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?

Which pre-defined Permission Profile should be assigned to an administrator that requires full access to audit all configurations without modifying them?A . AuditorB . Read Only AllC . Super UserD . Full AccessView AnswerAnswer: B Explanation: Explanation: To create a new permission profile: In SmartConsole, go to Manage & ...

March 24, 2018 No Comments READ MORE +

Which description of a self-healing network is true?

Which description of a self-healing network is true?A . is continuously on and available.B . demonstrates the ability to drive change through insight into network activity.C . protects the assets and users within the organizationD . adapts to changing needs beyond the limits of basic standards.View AnswerAnswer: A

March 24, 2018 No Comments READ MORE +

Which options are filtering options used to display SDEE message types? (Choose two.)

Which options are filtering options used to display SDEE message types? (Choose two.)A . stopB . noneC . errorD . allView AnswerAnswer: C,D

March 24, 2018 No Comments READ MORE +

What should you do?

You have 100 Azure subscriptions. All the subscriptions are associated to the same Azure Active Directory (Azure AD) tenant named contoso.com. You are a global administrator. You plan to create a report that lists all the resources across all the subscriptions. You need to ensure that you can view all...

March 24, 2018 No Comments READ MORE +

What is a required attribute to configure NTP authentication on a Cisco ASA?

What is a required attribute to configure NTP authentication on a Cisco ASA?A . Key IDB . IPsecC . AAAD . IKEv2View AnswerAnswer: A

March 24, 2018 No Comments READ MORE +

Which of the following ones should the technician use to place the web server and which of the following firewall rules should the technician configure?

A network technician needs to separate a web server listening on port 80 from the internal LAN and secure the server from the public Internet. The web server should be accessible to the public Internet over port 80 but not the private LAN. Currently, the network is segmented with a...

March 24, 2018 No Comments READ MORE +

A network administrator must enable which protocol to utilize EAP-Chaining?

A network administrator must enable which protocol to utilize EAP-Chaining?A . EAP-FASTB . EAP-TLSC . MSCHAPv2D . PEAPView AnswerAnswer: A

March 24, 2018 No Comments READ MORE +

In AAA, what function does authentication perform?

In AAA, what function does authentication perform?A . It identifies the actions that the user can perform on the device.B . It identifies the user who is trying to access a device.C . It identifies the actions that a user has previously taken.D . It identifies what the user can...

March 24, 2018 No Comments READ MORE +

Which of the following threats did the engineer MOST likely uncover?

A reverse engineer was analyzing malware found on a retailer’s network and found code extracting track data in memory. Which of the following threats did the engineer MOST likely uncover?A . POS malwareB . RootkitC . Key loggerD . RansomwareView AnswerAnswer: A

March 24, 2018 No Comments READ MORE +