Tag Archives: configuration

When you create a cluster, you need to download a Kubernetes configuration (kubeconfig) file for the

When you create a cluster, you need to download a Kubernetes configuration (kubeconfig) file for the cluster. Which three steps should be completed before downloading the kubeconfig file?Response: A. Added the public key value of the API signing key pair to the User Settings for your username. B. Install and configure the Oracle Cloud Infrastructure CLI. C. Generate… Read More »

In a Linux environment, what is the default location of the configuration file that Oracle Cloud Infrastructure

In a Linux environment, what is the default location of the configuration file that Oracle Cloud Infrastructure CLI uses for profile information? (Choose the best answer.) A. $HOME/.oci/con B. /usr/local/bin/con C. /usr/bin/oci/con D. /etc/.oci/con Correct Answer: A Before using Oracle Functions, you must have an Oracle Cloud Infrastructure CLI configuration file that contains the credentials of the user… Read More »

When you create a cluster, you need to download a Kubernetes configuration (kubeconfig) file for the

When you create a cluster, you need to download a Kubernetes configuration (kubeconfig) file for the cluster.Which three steps should be completed before downloadingthe kubeconfig file? A. Generate an API signing key pair. B. Verify whether you can access the cluster using Kubernetes Dashboard. C. Install and configure the Oracle Cloud Infrastructure CLI. D. Creating Kubernetes secret. E.… Read More »

Which configuration must the engineer implement to satisfy the requirements?

A network engineer is implementing a QoS policy for outbound management traffic classification and marking on a CPE device with these requirements: * Management protocols must be marked with DSCP AF class 2 with low drop probability. * Monitoring protocols must be marked with DSCP AF class 1 with low drop probability. * All remaining traffic must be… Read More »

The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMERABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2 has connectivity to the Internet?

Refer to the exhibit. The network engineer who manages ASN 65010 is provisioning a customer VRF named CUSTOMERABC on PE-2. The PE-CE routing protocol is OSPF Internet reachability is available via the OSPF 0 0 0.0/0 route advertised by CE-1 to PE-1 In the customer VRF Which configuration must the network engineer Implement on PE-2 so that CE-2… Read More »

Which configuration must the engineer apply?

A network engineer must implement SNMPv2 with these parameters: * Enable SNMP community string c1sc0 with read-only permissions. * Enable interface index persistence. Restrict the SNMP community to only the monitoring server with IP address 198.18.19.100/32. * Provide view-only access to ospfIfEntry and ospfNbrEntry. Which configuration must the engineer apply? A. configure terminal access-list 5 permit 198.18.19.100 0.0.0.0… Read More »

Which additional configuration is required for NetFlow to provide traceback information?

A. Cisco Express Forwarding must be configured for traffic that is egressing from the router to be properly reported. B. A classification ACL must be configured to identify which type of traffic will be analyzed. C. The BGP routing process must be started for any ingress or egress data to be reported when using NetFlow. Version 5. D.… Read More »

An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4?

Refer to the exhibit. An engineer has started to configure a router for OSPF, as shown Which configuration must an engineer apply on the network so that area 15 traffic from R5 to R1 will prefer the route through R4? A. Place the link between R3 and R5 in a stub area to force traffic to use the… Read More »

An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.)

Refer to the exhibit. An engineer has started to configure a router for secure remote access as shown. All users who require network access need to be authenticated by the SSH Protocol. Which two actions must the engineer implement to complete the SSH configuration? (Choose two.) A. Configure an IP domain name. B. Configure service password encryption. C.… Read More »

A network engineer is configuring a newly installed PE router at the regional gateway location. The new PE router must use MPLS core routing protocols with the existing P router, and LDP sessions between the two routers must be protected to provide faster MPLS convergence. Which configuration must the engineer perform on the network so that LDP sessions are established?

A. Enable communication over TCP port 646 for T-LDP hello messages. B. Enable RSVP-TE FRR on the LDP interface to protect the LDP session between routers. C. Enable LDP session protection on either one of the routers, which allows them to autonegotiate. D. Set the LDP session protection timer on each router to the same value. Answer: Option… Read More »