Which two technologies comprise a Cisco Presence deployment?

Correct Answer for the Question – Which two technologies comprise a Cisco Presence deployment? is given below Which two technologies comprise a Cisco Presence deployment? (Choose two.) Cisco Unified Presence Server Cisco Unity Connection Cisco Unified Communications Manager Active Directory Cisco Unified Border Element Cisco Expressway Correct Answer The Correct Answer for this Question is Cisco … Read more

Which three ways does the RADIUS protocol differ from TACACS?

Correct Answer for the Question – Which three ways does the RADIUS protocol differ from TACACS? is given below In which three ways does the RADIUS protocol differ from TACACS? (Choose three.)AEF RADIUS uses UDP to communicate with the NAS. RADIUS uses TCP to communicate with the NAS. RADIUS can encrypt the entire packet that is … Read more

Which of the following are features of IPsec transport mode?

Correct Answer for the Question – Which of the following are features of IPsec transport mode? is given below Which of the following are features of IPsec transport mode? (Choose three.)Answer: A,D,E IPsec transport mode is used between end stations IPsec transport mode is used between gateways IPsec transport mode supports multicast IPsec transport mode supports … Read more

Which two features do CoPP and CPPr use to protect the control plane?

Correct Answer for the Question – Which two features do CoPP and CPPr use to protect the control plane? is given below Which two features do CoPP and CPPr use to protect the control plane? (Choose two.)CF access lists policy maps traffic classification class maps Cisco Express Forwarding QoS Correct Answer The Correct Answer for this … Read more

What are the three layers of a hierarchical network design?

Correct Answer for the Question – What are the three layers of a hierarchical network design? is given below What are the three layers of a hierarchical network design? (Choose three.)ACE distribution user core server access Internet Correct Answer The Correct Answer for this Question is distribution core access The answers for the certifications of MNCs … Read more

What command can you use to verify the binding table status?

Correct Answer for the Question – What command can you use to verify the binding table status? is given below What command can you use to verify the binding table status?F show ip dhcp source binding show ip dhcp pool show ip dhcp snooping show ip dhcp snooping binding show ip dhcp snooping statistics show ip … Read more

Which two authentication types does OSPF support?

Correct Answer for the Question – Which two authentication types does OSPF support? is given below Which two authentication types does OSPF support? (Choose two.)AE MD5 HMAC AES 256 SHA-1 plaintext DES Correct Answer The Correct Answer for this Question is MD5 plaintext The answers for the certifications of MNCs could be very tricky to understand. … Read more

Which three statements describe DHCP spoofing attacks?

Correct Answer for the Question – Which three statements describe DHCP spoofing attacks? is given below Which three statements describe DHCP spoofing attacks? (Choose three.)BCD They can access most network devices. They can modify traffic in transit. They are used to perform man-in-the-middle attacks. They use ARP poisoning. They protect the identity of the attacker by … Read more

Which two next-generation encryption algorithms does Cisco recommend?

Correct Answer for the Question – Which two next-generation encryption algorithms does Cisco recommend? is given below Which two next-generation encryption algorithms does Cisco recommend? (Choose two.)AF AES 3DES DES MD5 DH-1024 SHA-384 Correct Answer The Correct Answer for this Question is AES SHA-384 The answers for the certifications of MNCs could be very tricky to … Read more

Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls?

Correct Answer for the Question – Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? is given below Which TACACS+ server-authentication protocols are supported on Cisco ASA firewalls? (Choose three.)Answer: B,C,E EAP ASCII PAP PEAP MS-CHAPv1 MS-CHAPv2 Correct Answer The Correct Answer for this Question is ASCII PAP MS-CHAPv1 The answers for the certifications of … Read more