Aused cryptographic tunneling to protect the privacy of data for multiple users simultaneously
Bused exclusively when a user is connected to a company’s internal network
Cestablishes a secure tunnel between two branch sites
Dallows the users to access company internal network resources through a secure tunnel
Correct Answer:D
Q344(none)
Which CRUD operation modifies an existing table or view?
Aread
Bcreate
Creplace
Dupdate
Correct Answer:D
Q345(none)
What is a DHCP client?
Aa workstation that requests a domain name associated with its IP address
Ba host that is configured to request an IP address automatically
Ca server that dynamically assigns IP addresses to hosts.
Da router that statically assigns IP addresses to hosts.
Correct Answer:B
Q346(none)
What is the same for both copper and fiber interfaces when using SFP modules?
AThey support an inline optical attenuator to enhance signal strength
BThey provide minimal interruption to services by being hot-swappable
CThey offer reliable bandwidth up to 100 Mbps in half duplex mode
DThey accommodate single-mode and multi-mode in a single module
Correct Answer:B
Q348(none)
An engineer must configure Interswitch VLAN communication between a Cisco switch and a third-party switch. Which action should be taken?
Aconfigure IEEE 802.1p
Bconfigure IEEE 802.1q
Cconfigure ISL
Dconfigure DSCP
Correct Answer:B
Q349(none)
Which protocol prompts the Wireless LAN Controller to generate its own local web administration SSL certificate for GUI access?
AHTTPS
BRADIUS
CTACACS+
DHTTP
Correct Answer:A
Q350(none)
In software defined architectures, which plane is distributed and responsible for traffic forwarding?
Amanagement plane
Bcontrol plane
Cpolicy plane
Ddata plane
Correct Answer:D
Q351(none)
Which function is performed by the collapsed core layer in a two-tier architecture?
Aenforcing routing policies
Bmarking interesting traffic for data polices
Cattaching users to the edge of the network
Dapplying security policies
Correct Answer:A
Q352(none)
Where does the configuration reside when a helper address Is configured to support DHCP?
Aon the router closest to the server
Bon the router closest to the client
Con every router along the path
Don the switch trunk interface
Correct Answer:B
Q353(none)
Refer to the exhibit. A network administrator must permit SSH access to remotely manage routers in a network. The operations team resides on the 10.20.1.0/25 network. Which command will accomplish this task?
Aaccess-list 2699 permit udp 10.20.1.0 0.0.0.255
Bno access-list 2699 deny tcp any 10.20.1.0 0.0.0.127 eq 22
Caccess-list 2699 permit tcp any 10.20.1.0 0.0.0.255 eq 22
Dno access-list 2699 deny ip any 10.20.1.0 0.0.0.255
Correct Answer:D
Already a statement is there in last to allow SSH Traffic for network 10.20.1.0 0.0.0.127, but Second statement says deny ip any 10.20.1.0 0.0.0.255, so how it will work once it is denied. So the right answer is remove the — no access-list 2699 deny ip any 10.20.1.0 0.0.0.255.