Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?

Which feature is automatically enabled when a voice VLAN is configured, but not automatically disabled when a voice VLAN is removed?A . portfastB . port-securityC . spanning treeD . storm controlView AnswerAnswer: A Explanation: Voice VLAN Configuration Guidelines You should configure voice VLAN on switch access ports. The voice VLAN...

March 17, 2018 No Comments READ MORE +

Which two default broadcast domain does the system create during initialization? (Choose two.)

Which two default broadcast domain does the system create during initialization? (Choose two.)A . DefaultB . NodeC . ClusterD . ManagementView AnswerAnswer: AC

March 17, 2018 No Comments READ MORE +

In Amazon Elastic Compute Cloud, which of the following is used for communication between instances in the same network (EC2-Classic or a VPC)?

In Amazon Elastic Compute Cloud, which of the following is used for communication between instances in the same network (EC2-Classic or a VPC)?A .  Private IP addressesB .  Elastic IP addressesC .  Static IP addressesD .  Public IP addressesView AnswerAnswer: A Explanation: A private IP address is an IP address that's...

March 17, 2018 No Comments READ MORE +

Which statement is true?

Refer to the exhibit. DSW1 should share the same MST region with switch DSW2. Which statement is true?A . Configure DSW1 with the same version number, and VLAN-to-instance mapping as shown on DSW2.B . DSW2 uses the VTP server mode to automatically propagate the MST configuration to DSW1.C . DSW1...

March 17, 2018 No Comments READ MORE +

Which of the following threats is MOST likely involved?

A network security technician observes multiple attempts to scan network hosts and devices. All the attempts originate from a single host on the network. Which of the following threats is MOST likely involved?A . Smurf attackB . Rogue APC . Compromised systemD . Unintentional DoSView AnswerAnswer: C

March 17, 2018 No Comments READ MORE +

Which two options are results of the configuration on the Cisco Nexus switch?

Refer to the exhibit. Which two options are results of the configuration on the Cisco Nexus switch? (Choose two.)A . When the interface receives a packet triggering the violation, address learning is stopped and ingress traffic from the nonsecure MAC address is droppedB . When the interface receives a packet...

March 17, 2018 No Comments READ MORE +

You are doing an internal security audit and intend to find out what ports are open on all the servers. What is the best way to find out?

You are doing an internal security audit and intend to find out what ports are open on all the servers. What is the best way to find out?A . Scan servers with NmapB . Scan servers with MBSAC . Telnet to every port on each serverD . Physically go to...

March 17, 2018 No Comments READ MORE +

Which of the following is an example of a coordination center?

Which of the following is an example of a coordination center?A . Cisco PSIRTB . Microsoft MSRCC . CERT division of the Software Engineering Institute (SEI)D . FIRSTView AnswerAnswer: C

March 17, 2018 No Comments READ MORE +

Referring to the diagram shown in the exhibit, what will happen when the SAS adapter in slot 2 on Node A fails?

Referring to the diagram shown in the exhibit, what will happen when the SAS adapter in slot 2 on Node A fails? A . Node A will continue to access all drives through the onboard SAS port 0a.B . Node A will lose all access to all drives.C . Node...

March 17, 2018 No Comments READ MORE +

Where should you create the files?

You are designing an Azure application that will use a worker role. The worker role will create temporary files. You need to minimize storage transaction charges. Where should you create the files?A . In Azure local storageB . In Azure Storage page blobsC . On an Azure DriveD . In...

March 17, 2018 No Comments READ MORE +