Tag Archives: control

Which of the following services can you control access to via IAM?

Which of the following services can you control access to via IAM? A. Networking components B. Compute Instances C. All services including IAM D. DB systems Correct Answer: C Oracle Cloud Infrastructure Identity and Access Management (IAM) lets you control who has access to your cloud resources. You can control what type of access a group of users… Read More »

Which show command shows statistics for the control plane policy and is used to troubleshoot?

Refer to the exhibit. Which show command shows statistics for the control plane policy and is used to troubleshoot? A. show control-plane CoPP B. show control-plane C. show policy-map control-plane D. show policy control-plane Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which show command shows statistics for the control plane… Read More »

In the Autonomous Database (ADB) Dedicated service, what does the fleet administrator use to control

In the Autonomous Database (ADB) Dedicated service, what does the fleet administrator use to control OCPU utilization? A. Oracle Machine Learning notebook B. Compartment quotas C. Resource Manager settings D. SQL Developer Web Console Correct Answer: B https://docs.oracle.com/en-us/iaas/Content/Database/Concepts/adboverview.htm

A network administrator is planning a new network with a segment-routing architecture using a distributed control plane. How is routing information distributed on such a network?

A. Each segment is signalled by an SR controller, but each segment makes Its own steering decisions based on SR policy. B. Each segment is signalled by MPLS, and each segment makes steering decisions based on the routing policy pushed by BGP. C. Each segment is signalled by an SR controller that makes the steering decisions for each… Read More »

In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints?

A. DHCP B. VXLAN C. SXP D. LISP Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post In a Cisco SD-Access fabric, which control plane protocol is used for mapping and resolving endpoints? appeared first on Majanto.

What is the result of applying this access control list? ip access-list extended STATEFUL 10 permit tcp any any established 20 deny ip any any

A. TCP traffic with the URG bit set is allowed. B. TCP traffic with the SYN bit set is allowed. C. TCP traffic with the ACK bit set is allowed. D. TCP traffic with the DF bit set is allowed. Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is the… Read More »

Which single security feature is recommended to provide Network Access Control in the enterprise?

Refer to the exhibit. Which single security feature is recommended to provide Network Access Control in the enterprise? A. MAB B. 802.1X C. WebAuth D. port security sticky MAC Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which single security feature is recommended to provide Network Access Control in the enterprise?… Read More »

An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true?

Refer to the exhibit. An engineer must block all traffic from a router to its directly connected subnet 209.165.200.0/24. The engineer applies access control list EGRESS in the outbound direction on the GigabitEthernet0/0 interface of the router. However, the router can still ping hosts on the 209.165.200.0/24 subnet. Which explanation of this behavior is true? A. Access control… Read More »

Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet?

A. permit 10.0.0.0 0.0.0.1 B. permit 10.0.0.1 0.0.0.254 C. permit 10.0.0.1 0.0.0.0 D. permit 10.0.0.0 255.255.255.254 Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which standard access control entry permits traffic from odd-numbered hosts in the 10.0.0.0/24 subnet? appeared first on Majanto.