Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?

Which controller is capable of acting as a STUN server during the onboarding process of Edge devices?A . vBond B. vSmart C. vManage D. PNP serverView AnswerAnswer: A

May 19, 2023 No Comments READ MORE +

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)

Which two network problems Indicate a need to implement QoS in a campus network? (Choose two.)A . port flapping B. excess jitter C. misrouted network packets D. duplicate IP addresses E. bandwidth-related packet lossView AnswerAnswer: B,E

May 19, 2023 No Comments READ MORE +

Which are two results of implementing this feature instead of traditional Netflow?

A network engineer is configuring Flexible Netflow and enters these commands Sampler Netflow1 Mode random one-out-of 100 Interface fastethernet 1/0 Flow-sampler netflow1 Which are two results of implementing this feature instead of traditional Netflow? (Choose two.)A . CPU and memory utilization are reduced. B. Only the flows of top 100...

May 19, 2023 No Comments READ MORE +

In an SD-Access solution what is the role of a fabric edge node?

In an SD-Access solution what is the role of a fabric edge node?A . to connect external Layer 3- network to the SD-Access fabric B. to connect wired endpoint to the SD-Access fabric C. to advertise fabric IP address space to external network D. to connect the fusion router to...

May 19, 2023 No Comments READ MORE +

Which method can a client use to authenticate to the network?

Refer to the exhibit. Based on the configuration in this WLAN security setting,. Which method can a client use to authenticate to the network?A . text string B. username and password C. certificate D. RADIUS tokenView AnswerAnswer: A

May 19, 2023 No Comments READ MORE +

What does the output confirm?

Refer to the exhibit. A network engineer configures NAT on R1 and enters the show command to verity the configuration. What does the output confirm?A . The first pocket triggered NAT to add on entry to NAT table B. R1 is configured with NAT overload parameters C. A Telnet from...

May 19, 2023 No Comments READ MORE +

What are two effects of this configuration?

Refer to the exhibit. What are two effects of this configuration? (Choose two.)A . R1 becomes the active router. B. R1 becomes the standby router. C. If R2 goes down, R1 becomes active but reverts to standby when R2 comes back online. D. If R1 goes down. R2 becomes active...

May 19, 2023 No Comments READ MORE +

Which feature must be configured to remedy the issue?

A company has an existing Cisco 5520 HA cluster using SSO. An engineer deploys a new single Cisco Catalyst 9800 WLC to test new features. The engineer successfully configures a mobility tunnel between the 5520 cluster and 9800 WLC. Client connected to the corporate WLAN roam seamlessly between access points...

May 18, 2023 No Comments READ MORE +

Which AP mode allows an engineer to scan configured channels for rogue access points?

Which AP mode allows an engineer to scan configured channels for rogue access points?A . sniffer B. monitor C. bridge D. localView AnswerAnswer: B

May 18, 2023 No Comments READ MORE +

Which two threats does AMP4E have the ability to block? (Choose two.)

Which two threats does AMP4E have the ability to block? (Choose two.)A . DDoS B. ransomware C. Microsoft Word macro attack D. SQL injection E. email phishingView AnswerAnswer: B,C Explanation: https://www.cisco.com/c/dam/en/us/products/collateral/security/amp-for-endpoints/c11-742008-00-cisco-amp-for-endpoints-wp-v2a.pdf

May 18, 2023 No Comments READ MORE +