-
When configuring role-based CLI on a Cisco router,which action will be taken first ?()
A . Create a parser view called "root view."
B . Log in to the router as the root user.
C . Enable the root view on the router.
D . Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
-
When configuring cisco secure acs to support wireless eap authentication,which device must be configured as a aaa client?()
A . location appliance
B . controller-based access points
C . wireless clients
D . wireless control system
E . wireless controller
-
Which of these is mandatory when configuring Cisco IOS Firewall? ()
A . Cisco IOS IPS enabled on the untrusted interface
B . NBAR enabled to perform protocol discovery and deep packet inspection
C . a route map to define the trusted outgoing traffic
D . a route map to define the application inspection rules
E . an inbound extended ACL applied to the untrusted interface
-
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()
A . In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B . In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C . In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D . In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
-
When configuring Frame Relay using point-to-point subinterfaces, which of the following must not be configured?()
A . The local DLCI on each subinterface of the Frame Relay.
B . The Frame Relay encapsulation on the physical interface.
C . An IP address on the physical interface.
D . The subinterface type as point-to-point
-
What OSPF command, when configured, will include all interfaces into area 0?()
A . network 0.0.0.0 255.255.255.255 area 0
B . network 0.0.0.0 0.0.0.0 area 0
C . network 255.255.255.255 0.0.0.0 area 0
D . network all-interfaces area 0
-
When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()
A . The period of time in which virtual login attempts are blocked, following repeated failed login attempts
B . The period of time in which virtual logins are blocked as security services fully initialize
C . A period of time when no one is attempting tolog in
D . The period of time between successive login attempt
-
When configuring a serial interface on a router, what is the default encapsulation?()
A . atm-dxi
B . frame-relay
C . hdlc
D . lapb
E .
-
How many VLANs on the UCS must be configured when using FCoE?()
A . One per blade
B . One per VSAN
C . One per fabric
D . None are required
-
When configuring non-IP point-to-point networks on clusters that are larger than two nodes, which Type of configuration should be defined?()
A . A start
B . A ring
C . A target mode fc
D . A target mode scsi
-
When a Cisco router is configured for SSH, it acts as an ()?
A . SSH client
B . SSH proxy
C . SSH server
D . SSH and SSL server
-
Which three elements must be used when you configure a router interface for vlan trunking?()
A . one IP network or subnetwork for each subinterface
B . subinterface numbering that matches vlan tages
C . subinterface encapsulation identifiers that match vlan tags
D . a management domain for each subinterface
E . one physical interface for each subinterface
F . one subinterface per vla
-
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A . Wireless Control System
B . wireless clients
C . wireless controllers
D . controller-based access points
E . Location Appliance
-
What does the mac packet-classify command do when applied to an interface configuration?()
A . It enables MAC ACLs to be applied to only IP packets that enter the interface.
B . It enables MAC ACLs to be applied to only non-IP packets that enter the interface.
C . It enables MAC ACLs to be applied to all packets that enter the interface.
D . It enables MAC ACLs to be used for QoS settings.
-
When configuring private VLANs, which configuration task must you do first?()
A . Configure the private VLAN port parameters.
B . Configure and map the secondary VLAN to the primary VLAN.
C . Disable IGMP snooping.
D . Set the VTP mode to transparent.
-
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()
A . TCP/IP
B . Multiprotocol
C . Named Pipes
D . NWLink IPX/SPX
-
Which two statements correctly identify factors to consider when Configuring WAN QoS?()
A . Voice Traffic uses Assured Forwarding
B . Voice Signaling traffic uses Assured Forwarding
C . Voice Signaling traffic uses priority queuing
D . Voice Traffic uses priority queuing
E . Voice signaling traffic should use priority queuing with Assured Forwarding
-
When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()
A . Any matching state condition will result with the state being triggered
B . Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to trigger
C . All specified state conditions are used as part of the requirements tobe met to for the state to trigger
D . Once the state conditions are met, they become persistent and can only be removed using the Reset feature
-
Which three elements must be used when you configure a router interface for vlan trunking?()
A . one IP network or subnetwork for each subinterface
B . subinterface numbering that matches vlan tages
C . subinterface encapsulation identifiers that match vlan tags
D . a management domain for each subinterface
E . one physical interface for each subinterface
F . one subinterface per vla
-
When configuring SSH, which is the Cisco minimum recommended modulus value?()
A . 2048 bits
B . 1024 bits
C . 256 bits
D . 512 bit
-
When will an "all configuration" backup be imported into the Cisco UCS Manager?()
A . During the initial configuration from the console
B . Once the basic configuration has been applied
C . To restore the configuration on a secondary fabric interconnect
D . To upgrade the firmware on a replacement fabric interconnect
-
Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
A . A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
B . An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
C . Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
D . Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
E . The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
F . The SDM provides a basic, intermediate, and advanced firewall wizard.
-
When configuring unified ports on a 5548 switch, which port ordering must be respected?()
A . Fibre Channel ports must be configured from the first port in the module.
B . Ethernet ports must be configured from the last port in the module.
C . Fibre Channel ports must be configured from the last port in the module.
D . Ethernet ports must be configured from the first port in the module.
-
Which does not need to be configured on ZXCTN6100 when performing basic configuration
A.A.UNI interface configuratio
B.B.Static MAC configuratio
C.C.configuratio
D.D.VLAN interface configuratio