Which AP mode allows an engineer to scan configured channels for rogue access points?
Which AP mode allows an engineer to scan configured channels for rogue access points?A . sniffer B. monitor C. bridge D. localView AnswerAnswer: B
What is the Json syntax that is formed from the data?
Refer to the exhibit. What is the Json syntax that is formed from the data?A . {Name: Bob Johnson, Age: 75, Alive: true, Favorite Foods: [Cereal, Mustard, Onions]} B. {"Name": "Bob Johnson", "Age": 75, "Alive": true, "Favorite Foods": ["Cereal", "Mustard", "Onions"]} C. {"˜Name': "˜Bob Johnson', "˜Age': 75, "˜Alive': True, "˜Favorite...
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?
Which design principle slates that a user has no access by default to any resource, and unless a resource is explicitly granted, it should be denied?A . least privilege B. fail-safe defaults C. economy of mechanism D. complete mediationView AnswerAnswer: B
How does an on-premises infrastructure compare to a cloud infrastructure?
How does an on-premises infrastructure compare to a cloud infrastructure?A . On-premises can increase compute power faster than cloud B. On-premises requires less power and cooling resources than cloud C. On-premises offers faster deployment than cloud D. On-premises offers lower latency for physically adjacent systems than cloud.View AnswerAnswer: D
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?
In a wireless Cisco SD-Access deployment, which roaming method is used when a user moves from one access point to another on a different access switch using a single WLC?A . Layer 3 B. inter-xTR C. auto anchor D. fast roamView AnswerAnswer: B Explanation: A fabric edge node provides onboarding...
What is the centralized control policy in a Cisco SD-WAN deployment?
What is the centralized control policy in a Cisco SD-WAN deployment?A . list of ordered statements that define user access policies B. set of statements that defines how routing is performed C. set of rules that governs nodes authentication within the cloud D. list of enabled services for all nodes...
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)A . increased MTU size B. hardware independence C. VM-level isolation D. increased flexibility E. extended 802.1Q VLAN rangeView AnswerAnswer: C,D
What is the reason for this behavior?
Refer to the exhibit. After implementing the configuration 172.20.20.2 stops replaying to ICMP echoes, but the default route fails to be removed. What is the reason for this behavior?A . The source-interface is configured incorrectly. B. The destination must be 172.30.30.2 for icmp-echo C. The default route is missing the...
What is a characteristic of MACsec?
What is a characteristic of MACsec?A . 802.1AE provides encryption and authentication services B. 802.1AE is bult between the host and switch using the MKA protocol, which negotiates encryption keys based on the master session key from a successful 802.1X session C. 802.1AE is bult between the host and switch...
Where is radio resource management performed in a cisco SD-access wireless solution?
Where is radio resource management performed in a cisco SD-access wireless solution?A . DNA Center B. control plane node C. wireless controller D. Cisco CMXView AnswerAnswer: C Explanation: Fabric wireless controllers manage and control the fabric-mode APs using the same general model as the traditional local-mode controllers which offers the...