Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?
Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBond B. vSmart C. vManage D. PNP serverView AnswerAnswer: A
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)
Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)A . port flapping B. excess jitter C. misrouted network packets D. duplicate IP addresses E. bandwidth-related packet lossView AnswerAnswer: B,E
Which are two results of implementing this feature instead of traditional Netflow?
A network engineer is configuring Flexible Netflow and enters these commands Sampler Netflow1 Mode random one-out-of 100 Interface fastethernet 1/0 Flow-sampler netflow1 Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)A . CPU and memory utilization are reduced. B. Only the flows of top 100...
In an SD-Access solution what is the role of a fabric edge node?
In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabric B. to connect wired endpoint to the SD-Access fabric C. to advertise fabric IP address space to external network D. to connect the fusion router to...
Which method can a client use to authenticate to the network?
Refer to the exhibit. Based on the configuration in this WLAN security setting,. Which method can a client use to authenticate to the network?A . text string B. username and password C. certificate D. RADIUS tokenView AnswerAnswer: A
What does the output confirm?
Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration. What does the output confirm?A . The first pocket triggered NAT to add on entry to NAT table B. R1 is configured with NAT overload parameters C. A Telnet from...
What are two effects of this configuration?
Refer to the exhibit. What are two effects of this configuration? (Choose two.)A . R1 becomes the active router. B. R1 becomes the standby router. C. If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online. D. If R1 goes down. R2 becomes active...
Which feature must be configured to remedy the issue?
A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points...
Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?A . sniffer B. monitor C. bridge D. localView AnswerAnswer: B
Which two threats does AMP4E have the ability to block? (Choose two.)
Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoS B. ransomware C. Microsoft Word macro attack D. SQL injection E. email phishingView AnswerAnswer: B,C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf