Tag Archives: connect

In one of your databases, the user HR has the password HRMGR. You want to connect to a database instance

In one of your databases, the user HR has the password HRMGR. You want to connect to a database instance whose listener listens on port 1531 by using this statement:CONNECT HR/[email protected]No name server is used.Which statement is true about ORCL? A. It must be the value of the SERVICE_NAMES parameter on the client side B. It must be… Read More »

In one of your databases, the user HR has the password HRMGR. You want to connect to a database instance

In one of your databases, the user HR has the password HRMGR.You want to connect to a database instance whose listener listens on port 1531 by using this statement:CONNECT HR/[email protected]No name server is used.Which statement is true about ORCL? A. It must resolve to a valid connect descriptor in the server’s tnsnames.ora file B. It must resolve to… Read More »

In one of your databases, the user HR has the password HRMGR. You want to connect to a database instance

In one of your databases, the user HR has the password HRMGR.You want to connect to a database instance whose listener listens on port 1531 by using this statement:CONNECT HR/[email protected]No name server is used.Which statement is true about ORCL? A. It must resolve to a valid connect descriptor in the client’s tnsnames.ora file B. It must be the… Read More »

A customer is requesting to connect to a 3rd-party webpage via OFSC Mobility. They need to send some

A customer is requesting to connect to a 3rd-party webpage via OFSC Mobility.They need to send some parameters to this webpage as part of the call.Which configuration is correct when you create the Action Link to support this request? A. Mark the Action Link as “Is plugin”, select the Type as “Native application”, enter the URL, enter the… Read More »

Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when it exceeds a configured threshold?

Refer the exhibit. Users on a network connected to router R3 report slow speeds when they connect to the server connected to R2. After analyzing traffic on the network, a network engineer identified congestion on the link between R2 and R3 as the cause. Which QoS service must the engineer implement to drop traffic on the link when… Read More »

An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN. Which feature allows the legacy clients to connect while still allowing other clients to use fast transition based on their OUIs?

A. over the DS B. 802.11k C. adaptive R D. 802.11v Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer configures a WLAN with fast transition enabled. Some legacy clients fail to connect to this WLAN.<br> Which feature allows the legacy clients to connect while still allowing other clients to… Read More »

A network administrator must configure endpoints using an 802.1X authentication method with EAP identity certificates that are provided by the Cisco ISE. When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be authorized to connect to the network. Which EAP type must be configured by the network administrator to complete this task?

A. EAP-TTLS B. EAP-TLS C. EAP-FAST D. EAP-PEAP-MSCHAPv2 Answer: Option B. Explanation:  Reference: https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975configure-eap-tls- authentication-with-is.html Show AnswerDiscussion The post A network administrator must configure endpoints using an 802.1X authentication method with EAP identity certificates that are provided by the Cisco ISE. When the endpoint presents the identity certificate to Cisco ISE to validate the certificate, endpoints must be… Read More »

A company manager is hosting a conference. Conference participants must connect to an open guest SSID and only use a preassigned code that they enter into the guest portal prior to gaining access to the network. How should the manager configure Cisco ISE to accomplish this goal?

A. Create logins for each participant to give them sponsored access. B. Create entries in the guest identity group for all participants. C. Create an access code to be entered in the AUP mode. D. Create a registration code to be entered on the portal splash page. Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/admin_guide/ b_ISE_26_admin_guide/b_ISE_admin_26_guest.html Show AnswerDiscussion The post… Read More »

A network administrator is setting up wireless guest access and has been unsuccessful in testing client access. The endpoint is able to connect to the SSID but is unable to gain access to the guest network through the guest portal. What must be done to identify the problem?

A. Use traceroute to ensure connectivity. B. Use context visibility to verify posture status. C. Use the identity group to validate the authorization rules. D. Use the endpoint ID to execute a session trace. Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/security/ise/1-3/admin_guide/b_ise_admin_guide_13/b_ise_admin_guide_sample_chapter_011001.html#concept_87916A77E87745 Show AnswerDiscussion The post A network administrator is setting up wireless guest access and has been unsuccessful in… Read More »

An engineer is using the low-impact mode for a phased deployment of Cisco ISE and is trying to connect to the network prior to authentication.Which access will be denied in this deployment?

A. DNS B. DHCP C. EAP D. HTTP Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer is using the low-impact mode for a phased deployment of Cisco ISE and is trying to connect to the network prior to authentication.<br>Which access will be denied in this deployment? appeared first on… Read More »