Question A network administrator just completed the basic implementation of Cisco CMX and tries to implement location tracking. The administrator is having trouble establishing connectivity between one of the WLCs through NMSP. What must be configured to establish this connectivity? (Choose two.) A. Add permanent licenses on the Cisco CMX server. B. Allow on the …
Cisco
Question When a next-generation endpoint security solution is selected for a company, what are two key deliverables that help justify the implementation? (Choose two.) A. signature-based endpoint protection on company endpoints B. email integration to protect endpoints from malicious content that is located in email C. real-time feeds from global threat intelligence centers D. macro-based …
Question Which two conditions must be met for EIGRP to maintain an alternate loop-free path to a remote network? (Choose two.) A. The Reported Distance from a successor is higher than the local Feasible Distance. B. A feasible successor must be present. C. The Reported Distance from a successor is lower than the local Feasible …
Question Company XYZ, a global content provider, owns data centers on different continents. Their data center design involves a standard three-layer design with a Layer 3-only core. HSRP is used as the FHRP. They require VLAN extension across access switches in all data centers, and they plan to purchase a Layer 2 interconnection between two …
Question How can EIGRP topologies be designed to converge as fast as possible in the event of a point-to-point link failure? A. Limit the query domain by use of summarization. B. Limit the query domain by use of default routes. C. Build neighbor adjacencies in a squared fashion. D. Limit the query domain by use …
Question Which undesired effect of increasing the jitter compensation buffer is true? A. The overall transport delay decreases and quality improves. B. The overall transport jitter increases and quality issues can occur. C. The overall transport delay increases and quality issues can occur. D. The overall transport jitter decreases and quality improves. Answer C. The …
Question You are designing the QoS policy for a company that is running many TCP-based applications. The company is experiencing tail drops for these applications. The company wants to use a congestion avoidance technique for these applications. Which QoS strategy can be used to fulfill the requirement? A. weighted fair queuing B. weighted random early …
Question An engineer must design a network for a company that uses OSPF LFA to reduce loops. Which type of loop would be reduced by using this design? A. DTP B. micro loops C. STP D. REP Answer B. micro loops Explanation OSPF LFA reduces micro loops. DTP is Dynamic Trunking Protocol, which is used …
Question An architect receives a functional requirement for a NAC system from a customer security policy stating that if a corporate Wi-Fi device does not meet current AV definitions, then it cannot access the corporate network until the definitions are updated. Which component should be built into the NAC design? A. posture assessment with remediation …
Question What is the default value for the Multiplier field of the BFD basic configuration in vManage? A. 3 B. 4 C. 5 D. 6 Answer A. 3 Explanation The correct answer for the question is A. 3. Here is the explanation: BFD (Bidirectional Forwarding Detection) is a protocol that provides fast detection of link …
Question A company recently discovered an attack propagating throughout their Windows network via a file named abc123456789xyz.exe. The malicious file was uploaded to a Simple Custom Detection list in the AMP for Endpoints Portal and the currently applied policy for the Windows clients was updated to reference the detection list. Verification testing scans on known …
Question Which solution operates as a cloud-native CASB? A. Cisco Stealthwatch Cloud B. Cisco Umbrella C. Cisco pxGrid D. Cisco CloudLock Answer D. Cisco CloudLock Explanation D. Cisco CloudLock Cisco CloudLock is the solution that operates as a cloud-native CASB (Cloud Access Security Broker). A CASB is a security technology that provides organizations with visibility …
Question Which metric is used by the monitoring agent to collect and output packet loss and jitter information? A. RTP performance B. TCP performance C. WSAv performance D. AVC performance Answer A. RTP performance Explanation The correct answer is: A. RTP performance When it comes to monitoring and collecting packet loss and jitter information, the …
Question Which entity is responsible for encrypting data in transit using an IaaS model versus a SaaS model? A. Cloud Application Developer for IaaS and Cloud SLA Manager for SaaS B. Cloud SLA Manager for IaaS and Cloud Application Developer for SaaS C. Cloud Service Provider for IaaS and Cloud Service Customer for SaaS D. …
Question Which DoS attack uses fragmented packets in an attempt to crash a target machine? A. teardrop B. smurf C. LAND D. SYN flood Answer A. teardrop Explanation The correct answer is A. teardrop. A teardrop attack is a type of denial-of-service (DoS) attack that uses fragmented packets in an attempt to crash a target …