How do AAA operations compare regarding user identification, user services, and access control?
How do AAA operations compare regarding user identification, user services, and access control?A . Authorization provides access control, and authentication tracks user servicesB . Accounting tracks user services, and authentication provides access control.C . Authorization identifies users, and authentication provides access controlD . Authentication identifies users, and accounting tracks user...
which function dose the range of private IPv4 addresses perform?
which function dose the range of private IPv4 addresses perform?A . allow multiple companies to each use the same address without conflictsB . provides a direct connection for hosts from outside of the enterprise networkC . ensues that NAT is not required to reach the internet with private range addressingD...
Which cloud service allows the organization to install its own operating system on a virtual machine?
An organization has decided to start using cloud-provided services. Which cloud service allows the organization to install its own operating system on a virtual machine?A . platform-as-a-serviceB . software-as-a-serviceC . network-as-a-serviceD . infrastructure-as-a-serviceView AnswerAnswer: D
Which statement correctly compares traditional networks and controller-based networks?
Which statement correctly compares traditional networks and controller-based networks?A . Only traditional networks offer a centralized control planeB . Only traditional networks natively support centralized managementC . Traditional and controller-based networks abstract policies from device configurationsD . Only controller-based networks decouple the control plane and the data planeView AnswerAnswer: D
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)
Which two must be met before SSH can operate normally on a Cisco IOS switch? (Choose two)A . The switch must be running a k9 (crypto) IOS imageB . The ip domain-name command must be configured on the switchC . IP routing must be enabled on the switchD . A...
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)
Which two tasks must be performed to configure NTP to a trusted server in client mode on a single network device? (Choose two)A . Enable NTP authenticationB . Verify the time zoneC . Disable NTP broadcastsD . Specify the IP address of the NTP serverE . Set the NTP server...
Which command accomplishes this task?
The network administrator wants VLAN 67 traffic to be untagged between Switch 1 and Switch 2 while all other VLANs are to remain tagged . Which command accomplishes this task?A . switchport access vlan 67B . switchport trunk allowed vlan 67C . switchport private-vlan association host 67D . switchport trunk...
Which two routes dose the router install in the routing table?
Refer to the exhibit. A router received these five routes form different routing information sources. Which two routes dose the router install in the routing table? (choose two)A . iBGP route 10.0.0.0/30B . RIP route 10.0.0.0/30C . EIGRP route 10.0.0.1/32D . OSPF route 10.0.0.0/30E . OSPF route 10.0.0.0/16View AnswerAnswer: CE
Which two interface counters are incremented?
A fram that enters a switch fails the Frame Check Sequence. Which two interface counters are incremented?A . input errosB . frameC . giantsD . CRCE . runtsView AnswerAnswer: AD
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?
In which way does a spine-and-leaf architecture allow for scalability in a network when additional access ports are required?A . A spine switch and a leaf switch can be added with redundant connections between themB . A spine switch can be added with at least 40 GB uplinksC . A...