Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
5 Cards in this Set
- Front
- Back
Question: 1 Which two services define cloud networks? (Choosetwo.) |
A. Infrastructure as a Service B. Platform as a Service C. Security as a Service D. Compute as a Service E.Tenancy as a Service Answer: A, B |
|
Question: 2 In which two situations should you use out-of-bandmanagement? (Choose two.) |
A. when a network device failsto forward packets B. when you require ROMMONaccess C. when managementapplications need concurrent access to the device D. when you requireadministrator access from multiple locationsE.when the control plane fails to respond Answer: A, B |
|
Question: 3 In which three ways does the TACACS protocol differfrom RADIUS? (Choose three.) |
A. TACACS uses TCP tocommunicate with the NAS. B. TACACS can encrypt theentire packet that is sent to the NAS. C. TACACS supports per-commandauthorization. D. TACACS authenticates andauthorizes simultaneously, causing fewer packets to be transmitted. E. TACACS uses UDP tocommunicate with the NAS.F. TACACS encrypts only thepassword field in an authentication packet. Answer: A, B, C |
|
Question: 4 According to Cisco best practices, which threeprotocols should the default ACL allow on an access port to enable wired BYODdevices to supply valid credentials and connect to the network? (Choose three.) |
A. BOOTP B. TFTP C. DNS D. MAB E. HTTP F. 802.1x Answer: A, B, C |
|
Question: 5 Which two next-generation encryption algorithms doesCisco recommend? (Choose two.) |
A. AES B. 3DES C. DES D. MD5 E. DH-1024 F.SHA-384 Answer: A, F |