In which OSI layer does IS-IS operate?

In which OSI layer does IS-IS operate?A . Layer 1B . Layer 2C . Layer 3D . Layer 4View AnswerAnswer: B Explanation: Yeah, it can advertise layer 3 IPv4 & v6 routes but it operates at L2. (that's why Fabricpath is based on IS-IS)

March 18, 2018 No Comments READ MORE +

CORRECT TEXT

CORRECT TEXT According to the following requirements, deploy your ftp login rule: • Users in example.com domain must be able to login to your ftp server as an anonymous user. • But users outside the example.com domain are unable to login to your serverView AnswerAnswer:

March 18, 2018 No Comments READ MORE +

What authentication type is used by SNMPv2?

What authentication type is used by SNMPv2?A . username and passwordB . community stringsC . HMAC-MD5D . HMAC-SHAView AnswerAnswer: B

March 18, 2018 No Comments READ MORE +

Which storage solution should you use for each app?

DRAG DROP You are designing an Azure storage solution for a company. The company has the following storage requirements: ・ An app named App1 uses data analytics on stored data. ・ App1 must store data on a hierarchical file system that uses Azure Active Directory (Azure AD) access control lists....

March 18, 2018 No Comments READ MORE +

SSL VPN authentication landing is not successful, and prompted "wrong user name or password", which option is wrong?

SSL VPN authentication landing is not successful, and prompted "wrong user name or password", which option is wrong?A . User name and password input error.B . User or group filter field configuration error.C . The certificate filter field is incorrectly configured.D . The administrator configured a policy that limits the...

March 18, 2018 No Comments READ MORE +

What protocol overcomes the weaknesses of LEAP?

What protocol overcomes the weaknesses of LEAP?A . EAP-TLSB . PEAPC . EAP-FASTD . EAP-TTLSView AnswerAnswer: C

March 18, 2018 No Comments READ MORE +

Which authentication method should be used?

After you configure the Cisco 5508 Wireless Controller v7.6, a customer requests an SSID that allows for client web authentication with email input. Which authentication method should be used?A . pass-throughB . authenticationC . splash page web redirectD . conditional web redirectE . on MAC filter failureView AnswerAnswer: A

March 18, 2018 No Comments READ MORE +

Which IBM tool should be used to verify the customer’s environment?

A customer is interested in the IBM Storwize Family and its ability to externally virtualize and integrate additional functionality; utilizing non-IBM hardware. The customer also wants to know if IBM Storwize Virtualization supports its various non-IBM Storage systems. Which IBM tool should be used to verify the customer’s environment?A ....

March 18, 2018 No Comments READ MORE +

Which statement about EPGs is true?

Which statement about EPGs is true?A . EPGs can both provide and consume a contract.B . EPGs can provide, but cannot consume, a contractC . EPGs cm consume, but cannot provide, a contractD . EPGs neither provide or consume contractsView AnswerAnswer: A

March 18, 2018 1 Comment READ MORE +

What is a requirement for posture administration services in Cisco ISE?

What is a requirement for posture administration services in Cisco ISE?A . at least one Cisco router to store Cisco ISE profiling policiesB . Cisco NAC Agents that communicate with the Cisco ISE serverC . an ACL that points traffic to the Cisco ISE deploymentD . the advanced license package...

March 17, 2018 No Comments READ MORE +