When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?
When configuration WPA2 Enterprise on a WLAN, which additional security component configuration is required?A . NTP server B. PKI server C. RADIUS server D. TACACS serverView AnswerAnswer: C
Which JSON syntax is valid?
Which JSON syntax is valid?A . {“switch”:”name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]} B. {„switch‟:(„name‟:‟dist1′,‟interfaces‟:[„gig1′,‟gig2′,‟gig3‟])} C. {“switch”:{“name”:”dist1″,”interfaces”:[“gig1″,”gig2″,”gig3”]}} D. {/”switch/”:{/”name/”:”dist1″,/”interfaces/”:[“gig1″,”gig2″,”gig3”]}}View AnswerAnswer: C Explanation: This JSON can be written as follows: { 'switch': { 'name': 'dist1', 'interfaces': ['gig1', 'gig2', 'gig3'] } }
What is one benefit of implementing a VSS architecture?
What is one benefit of implementing a VSS architecture?A . It provides multiple points of management for redundancy and improved support B. It uses GLBP to balance traffic between gateways. C. It provides a single point of management for improved efficiency. D. It uses a single database to manage configuration...
When two actions from the initial value of the TTL?
Refer to the exhibit. Which troubleshooting a routing issue, an engineer issues a ping from S1 to S2. When two actions from the initial value of the TTL? (Choose two.)A . The packet reaches R3, and the TTL expires B. R2 replies with a TTL exceeded message C. R3 replies...
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?
Which measure is used by an NTP server to indicate its closeness to the authoritative time source?A . latency B. hop count C. time zone D. stratumView AnswerAnswer: D
What is a consideration when designing a Cisco SD-Access underlay network?
What is a consideration when designing a Cisco SD-Access underlay network?A . End user subnets and endpoints are part of the underlay network. B. The underlay switches provide endpoint physical connectivity for users. C. Static routing is a requirement, D. It must support IPv4 and IPv6 underlay networksView AnswerAnswer: B...
Which explanation of this behavior is true?
Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation...
Which command configures the router to be the destination of jitter measurements?
An engineer is concerned with the deployment of new application that is sensitive to inter-packet delay variance. Which command configures the router to be the destination of jitter measurements?A . Router(config)# ip sla responder udp-connect 172.29.139.134 5000 B. Router(config)# ip sla responder tcp-connect 172.29.139.134 5000 C. Router(config)# ip sla responder...
Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?
Refer to the exhibit. Which configuration allows Customer2 hosts to access the FTP server of Customer1 that has the IP address of 192.168.1.200?A . ip route vrf Customer1 172.16.1.0 255.255.255.0 172.16.1.1 global ip route vrf Customer2 192.168.1.200 255.255.255.255 192.168.1.1 global ip route 192.168.1.0 255.255.255.0 Vlan10 ip route 172.16.1.0 255.255.255.0 Vlan20...
What are two benefits of YANG? (Choose two.)
What are two benefits of YANG? (Choose two.)A . It enforces the use of a specific encoding format for NETCONF. B. It collects statistical constraint analysis information. C. It enables multiple leaf statements to exist within a leaf list. D. It enforces configuration semantics. E. It enforces configuration constraints.View AnswerAnswer:...