What does the status show?

Refer to the Exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?A . ISAKMP SA is authenticated and can be used for Quick Mode.B . Peers have exchanged keys, but ISAKMP SA remains unauthenticated.C . VPN...

March 24, 2024 No Comments READ MORE +

What is used to perform OoS packet classification?

What is used to perform OoS packet classification?A . the Options field in the Layer 3 headerB . the Type field in the Layer 2 frameC . the Flags field in the Layer 3 headerD . the TOS field in the Layer 3 headerView AnswerAnswer: D Explanation: Type of service,...

March 23, 2024 No Comments READ MORE +

Which algorithms are used to secure REST API from brute attacks and minimize the impact?

Which algorithms are used to secure REST API from brute attacks and minimize the impact?A . SHA-512 and SHA-384B . MD5 algorithm-128 and SHA-384C . SHA-1, SHA-256, and SHA-512D . PBKDF2, BCrypt, and SCryptView AnswerAnswer: D Explanation: One of the best practices to secure REST APIs is using password hash....

March 23, 2024 No Comments READ MORE +

In an SD-Access solution what is the role of a fabric edge node?

In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabricB . to connect wired endpoint to the SD-Access fabricC . to advertise fabric IP address space to external networkD . to connect the fusion router to...

March 23, 2024 No Comments READ MORE +

Which measurement is used from a post wireless survey to depict the cell edge of the access points?

Which measurement is used from a post wireless survey to depict the cell edge of the access points?A . SNRB . NoiseC . RSSID . CCIView AnswerAnswer: A Explanation: Coverage defines the ability of wireless clients to connect to a wireless AP with a signal strength and quality high enough...

March 23, 2024 No Comments READ MORE +

Which two commands are needed to allow for full reachability between AS 1000 and AS 2000?

Refer to the Exhibit. Which two commands are needed to allow for full reachability between AS 1000 and AS 2000? (Choose two)A . R1#network 192.168.0.0 mask 255.255.0.0B . R2#no network 10.0.0.0 255.255.255.0C . R2#network 192.168.0.0 mask 255.255.0.0D . R2#network 209.165.201.0 mask 255.255.192.0E . R1#no network 10.0.0.0 255.255.255.0View AnswerAnswer: B, C

March 23, 2024 No Comments READ MORE +

Drag and drop the virtual components from the left onto their deceptions on the right

DRAG DROP Drag and drop the virtual components from the left onto their deceptions on the right. View AnswerAnswer:

March 23, 2024 No Comments READ MORE +

What is the function of a VTEP in VXLAN?

What is the function of a VTEP in VXLAN?A . provide the routing underlay and overlay for VXLAN headersB . dynamically discover the location of end hosts in a VXLAN fabricC . encapsulate and de-encapsulate traffic into and out of the VXLAN fabricD . statically point to end host locations...

March 22, 2024 No Comments READ MORE +

Which deployment model meets this requirement?

A customer has several small branches and wants to deploy a WI-FI solution with local management using CAPWAP. Which deployment model meets this requirement?A . AutonomousB . Mobility ExpressC . SD-Access wirelessD . Local modeView AnswerAnswer: B

March 22, 2024 No Comments READ MORE +

Which AP mode allows an engineer to scan configured channels for rogue access points?

Which AP mode allows an engineer to scan configured channels for rogue access points?A . snifferB . monitorC . bridgeD . localView AnswerAnswer: B

March 22, 2024 No Comments READ MORE +