-
When configuring cisco secure acs to support wireless eap authentication,which device must be configured as a aaa client?()
A . location appliance
B . controller-based access points
C . wireless clients
D . wireless control system
E . wireless controller
-
To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()
A . DB_CACHE_SIZE
B . SHARED_POOL_SIZE
C . LARGE_POOL_SIZE
D . JAVA_POOL_SIZE
E . SGA_MAX_SIZE
F . SORT_AREA_SIZE
-
Which of these is mandatory when configuring Cisco IOS Firewall? ()
A . Cisco IOS IPS enabled on the untrusted interface
B . NBAR enabled to perform protocol discovery and deep packet inspection
C . a route map to define the trusted outgoing traffic
D . a route map to define the application inspection rules
E . an inbound extended ACL applied to the untrusted interface
-
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()
A . In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B . In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C . In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D . In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
-
When configuring Frame Relay using point-to-point subinterfaces, which of the following must not be configured?()
A . The local DLCI on each subinterface of the Frame Relay.
B . The Frame Relay encapsulation on the physical interface.
C . An IP address on the physical interface.
D . The subinterface type as point-to-point
-
What OSPF command, when configured, will include all interfaces into area 0?()
A . network 0.0.0.0 255.255.255.255 area 0
B . network 0.0.0.0 0.0.0.0 area 0
C . network 255.255.255.255 0.0.0.0 area 0
D . network all-interfaces area 0
-
When under maneouvring conditions with the machinery being manually operated the control unit or console should be ()
A . automatically controlled
B . continuously manned
C . off power
D . none of the above is true
-
When configuring a serial interface on a router, what is the default encapsulation?()
A . atm-dxi
B . frame-relay
C . hdlc
D . lapb
E .
-
Automatic PGA Memory Management eliminates the need to manually configure which of the following initialization parameters?()
A . SORT_AREA_SIZE
B . HASH_AREA_SIZE
C . BITMAP_MERGE_AREA_SIZE
D . CREATE_BITMAP_AREA_SIZE
E . PGA_AGGREGATE_TARGET
-
How many VLANs on the UCS must be configured when using FCoE?()
A . One per blade
B . One per VSAN
C . One per fabric
D . None are required
-
When a Cisco router is configured for SSH, it acts as an ()?
A . SSH client
B . SSH proxy
C . SSH server
D . SSH and SSL server
-
When an UNDO segment is created manually by you, its availability status is set to which of the following automatically by Oracle?()
A . Online
B . Pending online
C . Offline
D . Stale
-
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A . Wireless Control System
B . wireless clients
C . wireless controllers
D . controller-based access points
E . Location Appliance
-
When configuring private VLANs, which configuration task must you do first?()
A . Configure the private VLAN port parameters.
B . Configure and map the secondary VLAN to the primary VLAN.
C . Disable IGMP snooping.
D . Set the VTP mode to transparent.
-
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()
A . TCP/IP
B . Multiprotocol
C . Named Pipes
D . NWLink IPX/SPX
-
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
A . Voice Traffic uses Assured Forwarding
B . Voice Signaling traffic uses Assured Forwarding
C . Voice Signaling traffic uses priority queuing
D . Voice Traffic uses priority queuing
E . Voice signaling traffic should use priority queuing with Assured Forwarding
-
When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()
A . Any matching state condition will result with the state being triggered
B . Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to trigger
C . All specified state conditions are used as part of the requirements tobe met to for the state to trigger
D . Once the state conditions are met, they become persistent and can only be removed using the Reset feature
-
When configuring SSH, which is the Cisco minimum recommended modulus value?()
A . 2048 bits
B . 1024 bits
C . 256 bits
D . 512 bit
-
Although manual plotting for CPA works well,the workload can become overwhelming when confronted with().
A . one target
B . two targets
C . three targets
D . a large number of target
-
When will an "all configuration" backup be imported into the Cisco UCS Manager?()
A . During the initial configuration from the console
B . Once the basic configuration has been applied
C . To restore the configuration on a secondary fabric interconnect
D . To upgrade the firmware on a replacement fabric interconnect
-
When configuring unified ports on a 5548 switch, which port ordering must be respected?()
A . Fibre Channel ports must be configured from the first port in the module.
B . Ethernet ports must be configured from the last port in the module.
C . Fibre Channel ports must be configured from the last port in the module.
D . Ethernet ports must be configured from the first port in the module.
-
Which does not need to be configured on ZXCTN6100 when performing basic configuration
A.A.UNI interface configuratio
B.B.Static MAC configuratio
C.C.configuratio
D.D.VLAN interface configuratio
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.
-
How can you initiate the source determination when you create a purchase requisition manually? There are 2 correct answers to this question.()
A.Use the button Assign Source of Supply in the header of the purchase requisition
B.Set the indicator for automatic source determination in the respective item of the purchase requisition
C.Set the indicator for automatic source determination in the header of the purchase requisition before you enter purchase requisition items
D.Use the button Assign Source of Supply in the respective item of the purchase requisition
此题为多项选择题。