Tag Archives: actions

Given: (Exhibit) Which three actions implement Java SE security guidelines? (Choose three.)

Given:Which three actions implement Java SE security guidelines? (Choose three.) A. Change line 2 to protected volatile String[] names;. B. Change line 2 to private final String[] names;. C. Change line 3 to private Secret(String[] names) {. D. Change line 7 to return names.clone();. E. Change line 4 to this.names = names.clone();. F. Change line 6 to public… Read More »

Given: (Exhibit) Which three actions implement Java SE security guidelines? (Choose three.)

Given:Which three actions implement Java SE security guidelines? (Choose three.) A. Change line 6 to public synchronized String[] getNames() {. B. Change line 2 to private final String[] names;. C. Change line 3 to private Secret(String[] names) {. D. Change line 7 to return names.clone();. E. Change line 4 to this.names = names.clone();. F. Change the getNames() method… Read More »

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.) A. Configure an IP domain name. B. Configure service password encryption. C.… Read More »

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

A. Configure the logging synchronous global configuration command. B. Configure the logging synchronous command under the vty. C. Increase the number of lines on the screen using the terminal length command. D. Configure the logging delimiter feature. E. Press the TAB key to reprint the command in a new line. Answer: Option B, E. Explanation:  No answer description… Read More »

While troubleshooting a routing issue, an engineer issues a ping from S1 to S2. Which two actions result from the initial value of the TTL? (Choose two.)

Refer to the exhibit. While troubleshooting a routing issue, an engineer issues a ping from S1 to S2. Which two actions result from the initial value of the TTL? (Choose two.) A. The packet reaches R2, and the TTL expires. B. R1 replies with a TTL exceeded message. C. The packet reaches R3, and the TTL expires. D.… Read More »

Which two actions, when applied in the LAN network segment, will facilitate Layer 3 CAPWAP discovery for lightweight AP? (Choose two.)

A. Utilize DHCP option 43. B. Utilize DHCP option 17. C. Configure an ip helper-address on the router interface. D. Enable port security on the switch port. E. Configure WLC IP address on LAN switch Answer: Option A, C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which two actions, when applied in the… Read More »

A network administrator is implementing a routing configuration change and enables routing debugs to track routing behavior during the change. The logging output on the terminal is interrupting the command typing process. Which two actions can the network administrator take to minimize the possibility of typing commands incorrectly? (Choose two.)

A. Configure the logging synchronous global configuration command. B. Configure the logging synchronous command under the vty. C. Increase the number of lines on the screen using the terminal length command. D. Configure the logging delimiter feature. E. Press the TAB key to reprint the command in a new line. Answer: Option B, E. Explanation:  No answer description… Read More »

An employee logs on to the My Devices portal and marks a currently on-boarded device as “Lost”. Which two actions occur within Cisco ISE as a result of this action? (Choose two.)

A. BYOD Registration status is updated to No. B. BYOD Registration status is updated to Unknown. C. The device access has been denied. D. Certificates provisioned to the device are not revoked. E. The device status is updated to Stolen. Answer: Option A, D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/ b_ise_admin_guide_sample_chapter_010000.html Show AnswerDiscussion The post An employee logs on to the… Read More »