Which configuration achieves this goal?

Refer to the exhibit. Security policy requires all idle-exec sessions to be terminated in 600 seconds. Which configuration achieves this goal?A . line vty 0 15 absolute-timeout 600B . line vty 0 15 exec-timeoutC . line vty 01 5 exec-timeout 10 0D . line vty 0 4 exec-timeout 600View AnswerAnswer:...

August 4, 2022 No Comments READ MORE +

Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?

An engineer is troubleshooting the Ap join process using DNS. Which FQDN must be resolvable on the network for the access points to successfully register to the WLC?A . wlcbostname.domain.comB . cisco-capwap-controller.domain.comC . ap-manager.domain.comD . primary-wlc.domain.comView AnswerAnswer: B Explanation: DNS: If you have configured your DHCP server to provide both...

August 4, 2022 No Comments READ MORE +

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?

When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP serverB . PKI serverC . RADIUS serverD . TACACS serverView AnswerAnswer: C

August 4, 2022 No Comments READ MORE +

What does the output verify?

A network engineer configures a new GRE tunnel and enters the show run command. What does the output verify?A . The tunnel will be established and work as expectedB . The tunnel destination will be known via the tunnel interfaceC . The tunnel keepalive is configured incorrectly because they must...

August 4, 2022 No Comments READ MORE +

Drag and drop the threat defense solutions from the left onto their descriptions on the right

DRAG DROP Drag and drop the threat defense solutions from the left onto their descriptions on the right. View AnswerAnswer:

August 4, 2022 No Comments READ MORE +

How does the RIB differ from the FIB?

How does the RIB differ from the FIB?A . The RIB is used to create network topologies and routing tables. The FIB is a list of routes to particular network destinations.B . The FIB includes many routes a single destination. The RIB is the best route to a single destination.C...

August 3, 2022 No Comments READ MORE +

Which method of account authentication does OAuth 2.0 within REST APIs?

Which method of account authentication does OAuth 2.0 within REST APIs?A . username/role combinationB . access tokensC . cookie authenticationD . basic signature workflowView AnswerAnswer: B Explanation : The most common implementations of OAuth (OAuth 2.0) use one or both of these tokens: + access token: sent like an API...

August 3, 2022 No Comments READ MORE +

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?

Which entity is responsible for maintaining Layer 2 isolation between segments In a VXLAN environment?A . switch fabricB . VTEPC . VNIDD . host switchView AnswerAnswer: C Explanation: VXLAN uses an 8-byte VXLAN header that consists of a 24-bit VNID and a few reserved bits. The VXLAN header together with...

August 3, 2022 No Comments READ MORE +

What action resolves this issue?

Refer to the exhibit. An engineer is investigating why guest users are able to access other guest user devices when the users are connected to the customer guest WLAN. What action resolves this issue?A . implement MFP client protectionB . implement split tunnelingC . implement P2P blockingD . implement Wi-Fi...

August 3, 2022 No Comments READ MORE +

Which characteristic distinguishes Ansible from Chef?

Which characteristic distinguishes Ansible from Chef?A . Ansible lacs redundancy support for the master server. Chef runs two masters in an active/active mode.B . Ansible uses Ruby to manage configurations. Chef uses YAML to manage configurations.C . Ansible pushes the configuration to the client. Chef client pulls the configuration from...

August 3, 2022 No Comments READ MORE +