Tag Archives: point

An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task?

Refer to the exhibit. An engineer must ensure that all traffic entering AS 200 from AS 100 chooses Link 2 as an entry point. Assume that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers. Which configuration accomplishes this task? A. R3(config)#route-map PREPEND permit 10 R3(config-route-map)#set as-path… Read More »

Which DNS lookup does an access point perform when attempting CAPWAP discovery?

A. CISCO-CONTROLLER.local B. CAPWAP-CONTROLLER.local C. CISCO-CAPWAP-CONTROLLER.local D. CISCO-DNA-CONTROLLER.local Answer: Option C. Explanation:  Reference: http://www.revolutionwifi.net/revolutionwifi/2010/11/capwap-controller-discovery-process_23.html Show AnswerDiscussion The post Which DNS lookup does an access point perform when attempting CAPWAP discovery? appeared first on Majanto.

An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task?

Refer to the exhibit. An engineer must ensure that all traffic leaving AS 200 will choose Link 2 as the exit point. Assuming that all BGP neighbor relationships have been formed and that the attributes have not been changed on any of the routers, which configuration accomplishes this task? A. R4(config-router)bgp default local-preference 200 B. R3(config-router)bgp default local-preference… Read More »

An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

A. closed B. high-impact C. low-impact D. open Answer: Option C. Explanation:  Reference: https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptivedeployment-guide/ta- p/3641515 Show AnswerDiscussion The post An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices.<br> Which deployment mode… Read More »

Which two frames can be configured on an Ethernet flow point? (Choose two.)

A. of a specific VLAN B. with different type of service values C. with identical type of service value D. with different class of service values E. with no tags Answer: Option A, E. Explanation:  No answer description available for this question Show AnswerDiscussion The post Which two frames can be configured on an Ethernet flow point? (Choose… Read More »

When defining a strategy for your business, how can competitor analysis help you establish a USP (or Unique Selling Point)?

When defining a strategy for your business, how can competitor analysis help you establish a USP (or Unique Selling Point)? It can enable you to offer discounts that compete directly with your competitors’ pricing It can identify how your offering is different in comparison to your competitors It can give you deeper insight into the market and their… Read More »

Once You’ve Worked Out Your Unique Selling Point (USP), How Would You Use It In A Long-Term Online Strategy?

Once You’ve Worked Out Your Unique Selling Point (USP), How Would You Use It In A Long-Term Online Strategy? Incorporate it within marketing materials across all channels to help raise customer awareness Create an email campaign letting your customers know why you are unique Film a video explaining your unique selling point and send it to employees Create… Read More »

All routers on this network have been configured with PIM-SM, and R1 is the rendezvous point. However, when asymmetric routing is implemented to modify link usage, the network begins to drop certain multicast traffic. Which action corrects the problem?

Refer to the exhibit. All routers on this network have been configured with PIM-SM, and R1 is the rendezvous point. However, when asymmetric routing is implemented to modify link usage, the network begins to drop certain multicast traffic. Which action corrects the problem? A. Place the routes affected by asymmetric routing in a VRF B. Remove the asymmetric… Read More »

Routers R1 and R2 reside in AS 65530, which is multihomed to the Internet. A network engineer expects devices in the AS to use R2 to access the Internet, but they are using R1 as the exit point from the AS. Which action corrects the problem?

Refer to the exhibit. Routers R1 and R2 reside in AS 65530, which is multihomed to the Internet. A network engineer expects devices in the AS to use R2 to access the Internet, but they are using R1 as the exit point from the AS. Which action corrects the problem? A. Add a sequence number to the route… Read More »