Topic 2: Exam Pool B
Which element enables communication between guest VMs within a virtualized environment?
A.
hypervisor
B.
vSwitch
C.
virtual router
D.
pNIC
vSwitch
Which method is used by an AP to join HA controllers and is configured in NVRAM?
A.
stored WLC information
B.
DNS
C.
IP Helper Addresses
D.
Primary/Secondary/Tertiary/Backup
stored WLC information
Explanation: An AP can be “primed” with up to three controllers—a primary, a secondary, and a tertiary. These are stored in nonvolatile memory so that the AP can remember them after a reboot or power failure.
A customer wants to provide wireless access to contractors using a guest portal on Cisco ISE. The portal Is also used by employees A solution is implemented, but contractors receive a certificate error when they attempt to access the portal Employees can access the portal without any errors. Which change must be implemented to allow the contractors and employees to access the portal?
A.
Install a trusted third-party certificate on the Cisco ISE.
B.
Install an Internal CA signed certificate on the contractor devices
C.
Install an internal CA signed certificate on the Cisco ISE
D.
install a trusted third-party certificate on the contractor devices.
Install an internal CA signed certificate on the Cisco ISE
What is the function of a control-plane node In a Cisco SD-Access solution?
A.
to run a mapping system that manages endpoint to network device relationships
B.
to implement policies and communicate with networks outside the fabric
C.
to connect external Layer 3 networks to the SD-Access fabric
D.
to connect APs and wireless endpoints to the SD-Access fabric
to run a mapping system that manages endpoint to network device relationships
Refer to the exhibit.
How does the router handle traffic after the CoPP policy is configured on the router?
A.
Traffic coming to R1 that does not match access list SNMP is dropped.
B.
Traffic coming to R1 that matches access list SNMP is policed.
C.
Traffic passing through R1 that matches access list SNMP is policed.
D.
Traffic generated by R1 that matches access list SNMP is policed.
Traffic passing through R1 that matches access list SNMP is policed.
Page 54 out of 168 Pages |
Previous |