Which of the following steps should the technician take NEXT?

Users are reporting their network is extremely slow. The technician discovers pings to external host have excessive response times. However, internal pings to printers and other PCs have acceptable response times. Which of the following steps should the technician take NEXT?A . Determine if any network equipment was replaced recentlyB...

February 23, 2018 No Comments READ MORE +

In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)

In which two formats can the IPv6 address fd15:0db8:0000:0000:0700:0003:400F:572B be written? (Choose two.)A . fd15:0db8:0000:0000:700:3:400F:572BB . fd15::db8::700:3:400F:572BC . fd15:db8:0::700:3:4F:572BD . fd15:0db8::7:3:4F:572BE . fd15:db8::700:3:400F:572BView AnswerAnswer: AE

February 23, 2018 No Comments READ MORE +

Which three metrics should you monitor?

An application sends Azure push notifications to a client application that runs on Windows Phone, iOS, and Android devices. Users cannot use the application on some devices. The authentication mechanisms that the application uses are the source of the problem. You need to monitor the number of notifications that failed...

February 23, 2018 No Comments READ MORE +

So from this output, what conclusion can you draw?

There is a network composed by router R1, router R2, router R3 and router R4. The four routers are interconnected by a LAN network. All four routers deploy the basic OSPF. When you are executing the command "display ospf peer" on Router 2, you will find the status between Router2...

February 23, 2018 No Comments READ MORE +

Which two capabilities are the most important to consider when assessing the headend device’s scalability?

A network consultant is designing an enterprise network that includes an IPsec headend termination device. Which two capabilities are the most important to consider when assessing the headend device’s scalability? (Choose two.)A . bandwidth capabilitiesB . packets per second processing capabilityC . CPU capabilitiesD . number of tunnels that can...

February 23, 2018 No Comments READ MORE +

What is the root cause of the problem?

The network manager has requested that several new VLANs (VLAN 10, 20, and 30) are allowed to traverse the switch trunk interface. After the command switchport trunk allowed vlan 10,20,30 is issued, all other existing VLANs no longer pass traffic over the trunk. What is the root cause of the...

February 23, 2018 No Comments READ MORE +

In clustered Data ONTAP 8.2, what is the maximum number of cluster nodes if any SAN protocols are being used?

In clustered Data ONTAP 8.2, what is the maximum number of cluster nodes if any SAN protocols are being used?A . 8 nodesB . 10 nodesC . 2 nodeD . 4 nodesE . 24 nodesF . 6 nodesView AnswerAnswer: A

February 23, 2018 No Comments READ MORE +

A user is unable to make a video call from an endpoint that is registered to the Cisco VCS. To isolate the cause, which two menu choices should the user check first? (Choose two.)

A user is unable to make a video call from an endpoint that is registered to the Cisco VCS. To isolate the cause, which two menu choices should the user check first? (Choose two.)A . Configuration > Call PolicyB . Status > RegistrationsC . Status > Search HistoryD . Status...

February 23, 2018 No Comments READ MORE +

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)

What are purposes of the Internet Key Exchange in an IPsec VPN? (Choose two.)A . The Internet Key Exchange protocol establishes security associationsB . The Internet Key Exchange protocol provides data confidentialityC . The Internet Key Exchange protocol provides replay detectionD . The Internet Key Exchange protocol is responsible for...

February 23, 2018 No Comments READ MORE +