A) Go to the location the rogue device is indicated to be and disable the power.
B) Create an SSID on the WLAN controller resembling the SSID of the rogue to spoof it and disable clients from connecting to it.
C) Classify the rogue as malicious in Cisco Prime.
D) Update the status of the rogue in Cisco Prime to contained.
Correct Answer
verified
Multiple Choice
A)
B)
C)
D)
Correct Answer
verified
Multiple Choice
A) Use the Cisco wireless phone site survey client utility.
B) Use a separate Cisco Wireless Lan Controller.
C) Enable load balance on voice WLANs.
D) Maintain -67dBM as a minimal RSSI.
E) Set data for 2.4 GHz and voice for 5 GHz using separate SSIDs.
F) Enable lower data rates for 2.4-GHz data WLAN.
Correct Answer
verified
Multiple Choice
A) Set down-bit on Edge routers on DC1
B) Define different VRFs on both DCs
C) Set OMP admin distance lower than BGP admin distance
D) Set same overlay AS on both DC WAN Edge routers
Correct Answer
verified
Multiple Choice
A) SACK
B) SEQ
C) RTT
D) SYN
Correct Answer
verified
Multiple Choice
A) DTLS or TLS tunnel with vSmart controller and IPsec tunnel with vBond controller
B) DTLS or TLS tunnel with vBond controller and IPsec tunnel with vManage controller
C) DTLS or TLS tunnel with vBond controller and IPsec tunnel with other WAN Edge routers
D) DTLS or TLS tunnel with vSmart controller and IPsec tunnel with other WAN Edge routers
Correct Answer
verified
Multiple Choice
A) WAN Edge
B) vSmart
C) vBond
D) vManage
Correct Answer
verified
Multiple Choice
A) System Status
B) Troubleshooting
C) Real Time
D) Events
Correct Answer
verified
Multiple Choice
A) 8
B) 256
C) 128
D) 64
Correct Answer
verified
Multiple Choice
A) WAN Edge routers
B) vSmart controllers
C) vBond controllers
D) vManage NMS
Correct Answer
verified
Multiple Choice
A) 6
B) 2
C) 4
D) 8
Correct Answer
verified
Multiple Choice
A) WPA2
B) RADIUS
C) 802.1X
D) EAP
Correct Answer
verified
Multiple Choice
A) VPN 1
B) VPN 0
C) VPN 512
D) VPN 511
Correct Answer
verified
Multiple Choice
A) HTTPS
B) TLS
C) IPsec
D) DTLS
Correct Answer
verified
Multiple Choice
A) It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vEdge and vManager.
B) It carries control traffic over secure IPsec connections between vSmart controllers and vEdge routers, and between vSmart and vBond.
C) It carries control traffic over secure DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart and vBond.
D) It carries out-of-band network management traffic among the Viptela devices in the overlay network.
Correct Answer
verified
Multiple Choice
A)
B)
C)
D)
Correct Answer
verified
Multiple Choice
A) ISR4351, ASR1002HX, vEdge2000, vEdge Cloud
B) ISR4321, ASR1001, Nexus, ENCS
C) ISR4321, ASR1001, ENCS, ISRv
D) ISR4351, ASR1009, vEdge2000, CSR1000v
Correct Answer
verified
Multiple Choice
A) local EAP
B) authentication caching
C) ?r?-authentication
D) Cisco Centralized Key Management
Correct Answer
verified
Multiple Choice
A) multiple vBond orchestrators
B) establishing affinity between vSmart controllers and WAN Edge routers
C) OMP
D) BFD
Correct Answer
verified
Multiple Choice
A) configure "ECMP limit"
B) configure "Send Backup Paths"
C) configure "Number of Paths Advertised per Prefix"
D) configure "Overlay AS Number"
Correct Answer
verified
Showing 61 - 80 of 147
Related Exams