Which configuration should the engineer use?
Refer to the exhibit. The IP SLA is configured in a router. An engineer must configure an EEM applet to shut down the interface and bring it back up when there is a problem with the IP SLA. Which configuration should the engineer use? A. event manager applet EEM_IP_SLA event...
Which command on router1 causes it to take over the forwarding role when it return to service?
Refer to the exhibit. Router 1 is currently operating as the HSRP primary with a priority of 110 router1 fails and router2 take over the forwarding role. Which command on router1 causes it to take over the forwarding role when it return to service?A . standby 2 priority B. standby...
Which technology does this represent?
A server running Linux is providing support for virtual machines along with DNS and DHCP services for a small business. Which technology does this represent?A . container B. Type 1 hypervisor C. hardware pass-thru D. Type 2 hypervisorView AnswerAnswer: D Explanation: In contrast to type 1 hypervisor, a type 2...
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)
What are two benefits of virtual switching when compared to hardware switching? (Choose two.)A . increased MTU size B. hardware independence C. VM-level isolation D. increased flexibility E. extended 802.1Q VLAN rangeView AnswerAnswer: C,D
What is a benefit of a virtual machine when compared with a physical server?
What is a benefit of a virtual machine when compared with a physical server?A . Multiple virtual servers can be deployed on the same physical server without having to buy additional hardware. B. Virtual machines increase server processing performance. C. The CPU and RAM resources on a virtual machine cannot...
What does the status show?
Refer to the exhibit. After configurating an IPsec VPN, an engineer enters the show command to verify the ISAKMP SA status. What does the status show?A . ISAKMP SA is authenticated and can be used for Quick Mode. B. Peers have exchanged keys, but ISAKMP SA remains unauthenticated. C. VPN...
What is a characteristic of YANG?
What is a characteristic of YANG?A . It is a Cisco proprietary language that models NETCONF data B. It allows model developers to create custom data types C. It structures data in an object-oriented fashion to promote model reuse D. It provides loops and conditionals to control now within modelsView...
Which command set must be configured on switch1 to achieve the following results on port fa0/1?
Refer to the exhibit. Rapid PVST+ is enabled on all switches. Which command set must be configured on switch1 to achieve the following results on port fa0/1? ✑ When a device is connected, the port transitions immediately to a forwarding state. ✑ The interface should not send or receive BPDUs....
which entity is a Type 1 hypervisor?
which entity is a Type 1 hypervisor?A . Oracle VM VirtualBox B. VMware server C. Citrix XenServer D. Microsoft Virtual PCView AnswerAnswer: C
Which encryption hashing algorithm does NTP use for authentication?
Which encryption hashing algorithm does NTP use for authentication?A . SSL B. MD5 C. AES128 D. AES256View AnswerAnswer: B Explanation: An example of configuring NTP authentication is shown below: Router1(config)#ntp authentication-key 2 md5 itexamanswers Router1(config)#ntp authenticate Router1(config)#ntp trusted-key 2