Tag Archives: group

An engineer must configure interface GigabitEthernet0/0 for VRRP group 10. When the router has the highest priority in the group, it must assume the master role. Which command set must be added to the initial configuration to accomplish this task? Initial Configuration interface GigabitEthernet0/0 description To IDF A 38-24-044.40 ip address 172.16.13.2 255.255.255.0

A. standby 10 ip 172.16.13.254 255.255.255.0 standby 10 preempt B. vrrp group 10 ip 172.16.13.254 255.255.255.0 vrrp group 10 priority C. standby 10 ip 172.16.13.254 standy 10 priority 120 D. vrrp 10 ip 172.16.13.254 vrrp 10 preempt Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer must configure interface GigabitEthernet0/0… Read More »

An engineer is configuring GigabitEthernet1/0/0 for VRRP. When the router has the highest priority in group 5, it must assume the master role. Which command set should the engineer add to the configuration to accomplish this task?

An engineer is configuring GigabitEthernet1/0/0 for VRRP. When the router has the highest priority in group 5, it must assume the master role. Which command set should the engineer add to the configuration to accomplish this task? interface GigabitEthernet1/0/0 description To IDF A 38-70-774-10 ip address 172.16.13.2 255.255.255.0 A. standby 5 ip 172.16.13.254 standby 5 priority 100 standby… Read More »

An engineer must configure HSKP group 300 on a Cisco IOS router. When the router is functional, it must be the active HSKP router. I he peer router has been configured using tie default priority value. Which commard set is required?

A. standby version 2 standby 300 priority 110 standby 300 preempt B. standby 300 priority 110 standby 300 timers 1 110 C. standby version 2 standby 300 priority 90 standby 300 preempt D. standby 300 priority 90 standby 300 preempt Answer: Option A. Explanation:  No answer description available for this question Show AnswerDiscussion The post An engineer must… Read More »

A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface. Which command should be used to accomplish this task?

A. cts role-based policy priority-static B. cts cache enable C. cts authorization list D. cts role-based enforcement Answer: Option D. Explanation:  No answer description available for this question Show AnswerDiscussion The post A network engineer is configuring a network device that needs to filter traffic based on security group tags using a security policy on a routed interface.<br>… Read More »

An administrator is adding network devices for a new medical building into Cisco ISE. These devices must be in a network device group that is identifying them as “Medical Switch” so that the policies can be made separately for the endpoints connecting through them. Which configuration item must be changed in the network device within Cisco ISE to accomplish this goal?

A. Change the device profile to Medical Switch. B. Change the device type to Medical Switch. C. Change the device location to Medical Switch. D. Change the model name to Medical Switch. Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post An administrator is adding network devices for a new medical building… Read More »

A network engineer is configuring Cisco TrustSec and needs to ensure that the Security Group Tag is being transmitted between two devices. Where in the Layer 2 frame should this be verified?

A. payload B. 802.1 AE header C. CMD field D. 802.1Q field Answer: Option C. Explanation:  Reference: https://www.cisco.com/c/dam/en/us/solutions/collateral/borderless-networks/trustsec/C07730151-00_overview_of_trustSec_og.pdf Show AnswerDiscussion The post A network engineer is configuring Cisco TrustSec and needs to ensure that the Security Group Tag is being transmitted between two devices.<br> Where in the Layer 2 frame should this be verified? appeared first on Majanto.

An administrator is manually adding a device to a Cisco ISE identity group to ensure that it is able to access the network when needed without authentication Upon testing, the administrator notices that the device never hits the correct authorization policy line using the condition EndPoints LogicalProfile EQUALS static_list Why is this occurring?

A. The dynamic logical profile is overriding the statically assigned profile B. The device is changing identity groups after profiling instead ot remaining static C. The logical profile is being statically assigned instead of the identity group D. The identity group is being assigned instead of the logical profile Answer: Option C. Explanation:  No answer description available for… Read More »

What is a method for transporting security group tags throughout the network?

A. by embedding the security group tag in the 802.1Q header B. by the Security Group Tag Exchange Protocol C. by enabling 802.1AE on every network device D. by embedding the security group tag in the IP header Answer: Option B. Explanation:  No answer description available for this question Show AnswerDiscussion The post What is a method for… Read More »