What is a characteristic of cloud-based network topology?
What is a characteristic of cloud-based network topology?A . physical workstations are configured to share resourcesB . services are provided by a public, private, or hybrid deploymentC . onsite network services are provided with physical Layer 2 and Layer 3 componentsD . wireless connections provide the sole access method to...
Which two primary drivers support the need for network automation? (Choose two)
Which two primary drivers support the need for network automation? (Choose two)A . Increasing reliance on self-diagnostic and self-healingB . Eliminating training needsC . Policy-derived provisioning of resourcesD . Reducing hardware footprintE . Providing a ship entry point for resource provisioningView AnswerAnswer: C E
Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?
Which QoS tool can you use to optimize voice traffic on a network that is primarily intended for data traffic?A . WREDB . FIFOC . PQD . WFQView AnswerAnswer: C
What does physical access control regulate?
What does physical access control regulate?A . access to specific networks based on business functionB . access to servers to prevent malicious activityC . access to computer networks and file systemsD . access to networking equipment and facilitiesView AnswerAnswer: D
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)
Which two protocols must be disabled to increase security for management connections to a Wireless LAN Controller? (Choose two)A . TelnetB . SSHC . HTTPD . HTTPSE . TFTPView AnswerAnswer: A C
What is the benefit of using FHRP?
What is the benefit of using FHRP?A . balancing traffic across multiple gateways in proportion to their loadsB . reduced management overhead on network routersC . reduced ARP traffic on the networkD . higher degree of availabilityView AnswerAnswer: D
When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?
Refer to the exhibit. When PC-A sends traffic to PC-B, which network component is in charge of receiving the packet from PC-A verifying the IP addresses, and forwarding the packet to PC-B?A . Layer 2 switchB . firewallC . Load balancerD . RouterView AnswerAnswer: D
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials?
After installing a new Cisco ISE server, which task must the engineer perform on the Cisco WLC to connect wireless clients on a specific VLAN based on their credentials? A. Enable the Authorized MIC APs against auth-list or AAA. B. Enable the allow AAA Override C. Disable the LAG Mode...
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original IP packet?
When a site-to-site VPN is configured, which IPsec mode provides encapsulation and encryption of the entire original IP packet?A . IPsec tunnel mode with AHB . IPsec transport mode with AHC . IPsec tunnel mode with ESPD . IPsec transport mode with ESPView AnswerAnswer: C
Which function is performed by DHCP snooping?
Which function is performed by DHCP snooping?A . rate-limits certain trafficB . listens to multicast traffic for packet forwardingC . provides DDoS mitigationD . propagates VLAN information between switchesView AnswerAnswer: A