What is a characteristic of cloud-based network topology?

What is a characteristic of cloud-based network topology?A . physical workstations are configured to share resourcesB . services are provided by a public, private, or hybrid deploymentC . onsite network services are provided with physical Layer 2 and Layer 3 componentsD . wireless connections provide the sole access method to...

September 21, 2021 No Comments READ MORE +

Which two primary drivers support the need for network automation? (Choose two)

Which two primary drivers support the need for network automation? (Choose two)A . Increasing reliance on self-diagnostic and self-healingB . Eliminating training needsC . Policy-derived provisioning of resourcesD . Reducing hardware footprintE . Providing a ship entry point for resource provisioningView AnswerAnswer: C E

September 21, 2021 No Comments READ MORE +

Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?

Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?A . WREDB . FIFOC . PQD . WFQView AnswerAnswer: C

September 21, 2021 No Comments READ MORE +

What does physical access control regulate?

What does physical access control regulate?A . access to specific networks based on business functionB . access to servers to prevent malicious activityC . access to computer networks and file systemsD . access to networking equipment and facilitiesView AnswerAnswer: D

September 21, 2021 No Comments READ MORE +

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)

Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)A . TelnetB . SSHC . HTTPD . HTTPSE . TFTPView AnswerAnswer: A C

September 21, 2021 No Comments READ MORE +

What is the benefit of using FHRP?

What is the benefit of using FHRP?A . balancing traffic across multiple gateways in proportion to their loadsB . reduced management overhead on network routersC . reduced ARP traffic on the networkD . higher degree of availabilityView AnswerAnswer: D

September 21, 2021 No Comments READ MORE +

When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?

Refer to the exhibit. When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?A . Layer 2 switchB . firewallC . Load balancerD . RouterView AnswerAnswer: D

September 20, 2021 No Comments READ MORE +

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?

After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials? A. Enable the Authorized MIC APs against auth-list or AAA. B. Enable the allow AAA Override C. Disable the LAG Mode...

September 20, 2021 No Comments READ MORE +

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original IP packet?

When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original IP packet?A . IPsec tunnel mode with AHB . IPsec transport mode with AHC . IPsec tunnel mode with ESPD . IPsec transport mode with ESPView AnswerAnswer: C

September 20, 2021 No Comments READ MORE +

Which function is performed by DHCP snooping?

Which function is performed by DHCP snooping?A . rate-limits certain trafficB . listens to multicast traffic for packet forwardingC . provides DDoS mitigationD . propagates VLAN information between switchesView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +