Which statement about Cisco umbrella branch operation is true?

Which statement about Cisco umbrella branch operation is true?A . All DNS requests are redirected at the ISC . Signature files of suspicious domains are periodically downloaded to the ISRD . It must be installed and configured on each endpointE . All policy management and reporting is done from the...

February 27, 2018 No Comments READ MORE +

Which command is used to unload a single module currently loaded by the kernel without unloading any modules that it depends upon? (Specify the command with or without path information)

Which command is used to unload a single module currently loaded by the kernel without unloading any modules that it depends upon? (Specify the command with or without path information)View AnswerAnswer: rmmod, /sbin/rmmod

February 27, 2018 No Comments READ MORE +

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?

A single PRI can deliver multiple voice calls simultaneously using which of the following Layer 1 technologies?A . Time division multiplexingB . Analog circuit switchingC . CSMA/CDD . Time division spread spectrumView AnswerAnswer: A

February 27, 2018 No Comments READ MORE +

Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)

Which of the following statements about policy-based IPsec tunnels are true? (Choose two.)A . They support GRE-over-IPsec.B . They can be configured in both NAT/Route and transparent operation modes.C . They require two firewall policies: one for each direction of traffic flow.D . They support L2TP-over-IPsec.View AnswerAnswer: B,C

February 27, 2018 No Comments READ MORE +

Which of the following should the analyst use?

An analyst wants to use a command line tool to identify open ports and running services on a host along with the application that is associated with those services and port. Which of the following should the analyst use?A . WiresharkB . QualysC . netstatD . nmapE . pingView AnswerAnswer:...

February 27, 2018 No Comments READ MORE +

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).

Which of the following protocols are used for accessing a command line terminal session for management purposes? (Select TWO).A . TelnetB . FTPC . SNMPD . SSHE . RDPView AnswerAnswer: A,D

February 27, 2018 No Comments READ MORE +

Which component of IBM Cloud Manager with OpenStack allows clients to automate how they build, deploy, and manage their infrastructure?

Which component of IBM Cloud Manager with OpenStack allows clients to automate how they build, deploy, and manage their infrastructure?A . ChefB . NovaC . NeutronD . CinderView AnswerAnswer: A

February 27, 2018 No Comments READ MORE +

Which STP feature allows an access port to bypass the learning and listening?

Which STP feature allows an access port to bypass the learning and listening?A . PortFastB . BPDU GuardC . BPDU FilterD . UplinkFastView AnswerAnswer: A

February 27, 2018 No Comments READ MORE +

Which two of these are required in order to complete the password recovery of a Cisco TelePresence System endpoint? (Choose two.)

Which two of these are required in order to complete the password recovery of a Cisco TelePresence System endpoint? (Choose two.)A . must have FTP enabled on the endpointB . must have SSH enabled on the endpointC . must have the security question answer for the endpointD . must be...

February 27, 2018 No Comments READ MORE +

Which statement about this debug output is true?

Refer to the below. Which statement about this debug output is true?A . The requesting authentication request came from username GETUSEC . The TACACS+ authentication request came from a valid user.D . The TACACS+ authentication request passed, but for some reason the user's connection was closed immediately.E . The initiating...

February 27, 2018 No Comments READ MORE +