Which solution enables Cisco devices to be monitored with automated support capabilities?

Which solution enables Cisco devices to be monitored with automated support capabilities?A . Connected Service AssuranceB . Smart Call HomeC . Cisco intelligent Monitoring AgentD . Smart Bonding ServiceView AnswerAnswer: B

January 29, 2018 No Comments READ MORE +

In this scenario, which non-disruptive action would accomplish this task?

A 4-node cluster is upgraded from clustered Data ONTAP 8.2 to ONTAP 9.1. LUNs that were created after the upgrade are visible only on the target ports of the node that owns the LUN and its HA partner. LUNs that were on the system before the upgrade are visible on...

January 29, 2018 No Comments READ MORE +

You need to inspect all the network traffic from VM1 to VM2 for a period of three hours. Solution: From Azure Monitor, you create a metric on Network In and Network Out. Does this meet the goal?

Note: This is part of a series of questions that present the same scenario. Each in the series contains a unique solution that might meet the stated goals. Some sets might have more than one correct solution, while others might not have a correct solution. After you answer a in...

January 29, 2018 No Comments READ MORE +

Which of the following should be implemented?

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?A . DLPB . AUPC . NDAD . SLAView AnswerAnswer: A

January 29, 2018 No Comments READ MORE +

Which command is used to enable 802.1x authorization on an interface?

Which command is used to enable 802.1x authorization on an interface?A . aaa authorization auth-proxy defaultB . authentication port-control autoC . authentication openD . authentication control-direction bothE . aaa authorization network default group tacacs+View AnswerAnswer: B

January 29, 2018 No Comments READ MORE +

Which two statements about ping flood attacks are true? (Choose two.)

Which two statements about ping flood attacks are true? (Choose two.)A . They use ICMP packets.B . The attack is intended to overwhelm the CPU of the target victim.C . They attack by sending ping requests to the return address of the network.D . They use SYN packets.E . They...

January 29, 2018 No Comments READ MORE +

Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)

Which two application protocols require application layer gateway support when using NAT on a Cisco router? (Choose two.)A . SIPB . HTTPC . FTPD . SMTPE . POP3View AnswerAnswer: A, C

January 29, 2018 No Comments READ MORE +

Which result of the configuration snippet is true?

Refer to the exhibit. Which result of the configuration snippet is true?A . A VACL map in applied to VLAN 100 and VLAN 200B . VACL acl01 is applied to VLAN 100 through 200C . Acl01 is applied to all of the VLANs on the switchD . Global statistics are...

January 29, 2018 No Comments READ MORE +

Which action should the administrator take to resolve the issue?

An administrator has multiple vCenter Server 6.5 systems but cannot enable Storage I/O Control (SIOC) on a datastore shared by ESXi hosts managed by the vCenter Server systems. Which action should the administrator take to resolve the issue?A . Unmount the datastore and then enable SIOC on the vCenter Server...

January 29, 2018 No Comments READ MORE +