What feature does the given configuration im plement?

Refer to the exhibit. What feature does the given configuration im plement?A . DHCP Secured IP Address AssignmentB . DHCP snoopingC . Dynamic ARP learningD . ARP probingView AnswerAnswer: A

February 14, 2018 No Comments READ MORE +

What possible issue does the given output indicate?

Refer to the exhibit. You issued the show crypto isakmp sa command to troubleshoot a connection failure on an IPsec VPN. What possible issue does the given output indicate?A . The pre-shared keys are mismatched.B . The peer is failing to respond.C . The transform sets are mismatched.D . The...

February 11, 2018 No Comments READ MORE +

Which three message are part of the SSL protocol? (Choose three.)

Which three message are part of the SSL protocol? (Choose three.)A . Change CipherSpecB . CipherSpecC . AlertD . Message AuthenticationE . HandshakeF . RecordView AnswerAnswer: ACE

February 8, 2018 No Comments READ MORE +

Looking at the configuration of the switch, what could be the possible issue?

Refer to the exhibit. A customer has opened a case with Cisco TAC reporting an issue that one of the Windows client supposed to login to the network using MAB is no longer able to access any allowed resources. Looking at the configuration of the switch, what could be the...

February 8, 2018 No Comments READ MORE +

Which command is used to enable 802.1x authorization on an interface?

Which command is used to enable 802.1x authorization on an interface?A . aaa authorization auth-proxy defaultB . authentication port-control autoC . authentication openD . authentication control-direction bothE . aaa authorization network default group tacacs+View AnswerAnswer: B

January 29, 2018 No Comments READ MORE +

Which two statements about ping flood attacks are true? (Choose two.)

Which two statements about ping flood attacks are true? (Choose two.)A . They use ICMP packets.B . The attack is intended to overwhelm the CPU of the target victim.C . They attack by sending ping requests to the return address of the network.D . They use SYN packets.E . They...

January 29, 2018 No Comments READ MORE +

Which statement about router R1 is true?

Q47.Refer to the exhibit. Which statement about router R1 is true?A . Its startup configuration is missingB . Its NVRAM contains public and private crypto keysC . RMON is configuredD . It running configuration is missingE . Its private-config is corruptView AnswerAnswer: B

January 19, 2018 No Comments READ MORE +

AMP cloud is configured to report AMP Connector scan events from windows machines belong to “Audit” group to MFC but the scanned events are not showing up in FMC, what could be the possible cause?

Refer to the exhibit. AMP cloud is configured to report AMP Connector scan events from windows machines belong to “Audit” group to MFC but the scanned events are not showing up in FMC, what could be the possible cause?A . DNS address is misconfigured on FMC . FMC is pointing...

January 18, 2018 No Comments READ MORE +

Which two limitations of ISE inline posture are true? (Choose two.)

Which two limitations of ISE inline posture are true? (Choose two.)A . The Cisco Discovery Protocol is not supported.B . Multicast is not supported.C . Flexible NetFIow is not supported.D . The Simple Network Management Protocol agent is not supported.E . QoS is not supported in a virtual environment.View AnswerAnswer:...

January 15, 2018 No Comments READ MORE +

Which two options must be included in your DNS server to receive email from all external senders?

Q64.Your organization is deploying an ESA for email security for inbound and outbound emails. To receive inbound emails from external organizations, you must setup your DNS servers with the appropriate records so that the sending email server can determine Which email gateway to send to. Assume that you have two...

January 12, 2018 No Comments READ MORE +