Which API is used in controller-based architectures to interact with edge devices?

Which API is used in controller-based architectures to interact with edge devices?A . overlayB . northboundC . underlayD . southboundView AnswerAnswer: D

September 26, 2020 No Comments READ MORE +

Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?

Which command prevents passwords from being stored in the configuration as plaintext on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B

September 26, 2020 No Comments READ MORE +

Which function dose the range of private IPv4 addresses perform?

Which function dose the range of private IPv4 addresses perform?A . allow multiple companies to each use the same address without conflictsB . provides a direct connection for hosts from outside of the enterprise networkC . ensues that NAT is not required to reach the internet with private range addressingD...

September 26, 2020 No Comments READ MORE +

Which function does an SNMP agent perform?

Which function does an SNMP agent perform?A . It manages routing between Layer 3 devices in a network,B . It coordinates user authentication between a network device and a TACACS+ or RADIUS server.C . It sends information about MIB variables in response to requests from the NME . It requests...

September 26, 2020 No Comments READ MORE +

Which two routes dose the router install in the routing table?

Refer to the exhibit. A router received these five routes form different routing information sources. Which two routes dose the router install in the routing table? (choose two)A . iBGP route 10.0.0.0/30B . RIP route 10.0.0.0/30C . EIGRP route 10.0.0.1/32D . OSPF route 10.0.0.0/30E . OSPF route 10.0.0.0/16View AnswerAnswer: CE

September 25, 2020 No Comments READ MORE +

Which statement explains the configuration error message that is received?

Refer to the exhibit. Which statement explains the configuration error message that is received?A . it belongs to a private IP address rangeB . the router dose not support /28 maskC . it is a network IP addressD . it is a broadcast IP addressView AnswerAnswer: D

September 25, 2020 No Comments READ MORE +

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?

When a site-to-site VPN is used, which protocol is responsible for the transport of user data?A . IKEv2B . IKEv1C . IPsecD . MD5View AnswerAnswer: C

September 25, 2020 No Comments READ MORE +

What is a difference between RADIUS and TACACS+?

What is a difference between RADIUS and TACACS+?A . TACACS+ encrypts only password information and RADIUS encrypts the entire payloadB . RADIUS logs all commands that are entered by the administrator, but TACACS+ logs only start, stop, and interim commandsC . RADIUS is most appropriate for dial authentication, but TACACS+...

September 25, 2020 No Comments READ MORE +

Which configuration accomplishes this task?

Router R1 must send all traffic without a matching routing-table entry to 192.168.1.1. Which configuration accomplishes this task?A . R1# config t R1(config)# ip routing R1(config)# ip route default-route 192.168.1.1B . R1# config t R1(config)# ip routing R1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.1C . R1# config t R1(config)# ip routing...

September 25, 2020 No Comments READ MORE +

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?

Which feature on the Cisco Wireless LAN Controller when enabled restricts management access from specific networks?A . CPU ACLB . TACACSC . Flex ACLD . RADIUSView AnswerAnswer: A Explanation: Reference: https://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71978-acl-wlc.html

September 25, 2020 No Comments READ MORE +