-
In IPCCX, skills can be assigned to which of the following configuration objects?()
A . resources
B . Skill Groups
C . competence levels
D . Resource Grou
-
Which statement is true about the default e-mail address used in the E-mail Subsystem Configuration page? ()
A . If no From field is specified with an address in the Send E-mail step, it will use the default.
B . All Send E-mail steps are automatically sent as a Blind cc: to the default.
C . Alarms that are generated by the CRS Server are automatically sent to it.
D . If no e-mail contact is specified in the Create E-mail step, the default is used.
-
An engineer is preparing an implementation plan in which the configuration needs to influence BGP's choice of best path. Which of the following is least likely to be used by the configuration in this imple mentation plan?()
A . Weight
B . Origin code
C . AS_Path
D . Local_Pref
-
Which two tunneling techniques in IPv6 do not require an IPv4 tunnel destination in the configuration?()
A . 6to4
B . 6over4
C . ISATAP
D . GRE
-
Which three statements describe the configuration change management feature in DCNM LAN? ()
A . Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.
B . DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.
C . You can archive a maximum of 50 configuration versions per managed device.
D . Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.
E . Device-running configuration will be archived only if it differs from the last archived version.
-
An Enterprise customer wants to reduce the configuration effort for their Teleworker router deployments. What is one way to simplify the IPSec-related configuration in the remote routers?()
A . CiscoWorks VPN Manager
B . deploy Linksys routers with menu-driven configuration
C . Easy VPN client mode
D . disable 802.1x and Auth Proxy on the Teleworker router
-
In a shared server configuration, which two describe the actions that the listener can take to service a client request?()
A . The listener hands the connection request directly to a dispatcher.
B . A dedicated server inherits the connection request from the listener.
C . The client connects to a dedicated server directly using a protocol address provided by the listener.
D . The application initiating the session spawns a dedicated server process for the connection request.
E . The listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.&e
-
In which situation would you use the Oracle Shared Server configuration?()
A . when performing export and import using Oracle Data Pump
B . when performing backup and recovery operations using Oracle Recovery Manager
C . when performing batch processing and bulk loading operation in a data warehouse environment
D . in an online transaction processing (OLTP) system where large number of client sessions are idle most of the time
-
In which Cisco IOS configuration mode is the route distinguisher (RD) configured?()
A . R1(config-route-at)#
B . R1(config-route-map)#
C . R1(config-it)#
D . R1(config-vrf)#
E . R1(config)#
F . R1(router)#
-
What does the command "IP ARP synchronize" do in a vPC configuration?()
A . Synchronizes ARP entries between vPC peers every five minutes
B . Triggers a manual update of ARP entries from the primary peer to the secondary
C . Enables a bulk loading of ARP entries when a vPC peer is restored
D . Uses the peer-keepalive link to maintain ARP table consistency
-
You need to recommend a VHD configuration for the virtual desktop pool VMs. What should you include in the recommendation?()
A . differencing VHDs
B . dynamically expanding VHDs
C . fixed-size VHDs
D . pass-through disk
-
What type of configuration can provide the best availability in a Virtual IO Server environment?()
A . Provide multiple paths to all resources through 2 or more Virtual IO Servers
B . Mirror all disk resources on the Virtual IO Server to present to the client LPAR
C . Mirror all disk resources on the client LPAR to the shared SCSI on the Virtual IO Server
D . Trunk multiple Ethernet adapters on the Virtual IO Server to a single Shared Ethernet Adapter (SEA)
-
Which command is used to alter the attributes of "log type" defined in the alog configuration database?()
A . alog -t
B . alog -s
C . alog -C
D . alog -L
-
Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()
A . It is hashed using SHA
B . It is encrypted using DH group 5
C . It is hashed using MD5
D . It is encrypted via the service password-encryption command
E . It is hashed using a proprietary Cisco hashing algorithm
F . It is encrypted using a proprietary Cisco encryption algorithm
-
What is the use of an "all configuration" backup in Cisco UCS?()
A . Can be used to migrate from a 6120 to a 6140 and retain the same service profiles
B . Can only be used on the fabric interconnect on which it was created
C . Can be used to migrate from a 6120 to 6140 and retain system IP addresses and cluster information
D . Can be used to match firmware versions between 6120 and 6140 during a migratio
-
What is the name of the file that is used to provide the configuration setting in unattended mode?()
A . Answer file.
B . Startup file.
C . Unattended configuration file.
D . Network file.
-
Which configuration should be done in order to improve the performance of the Cisco Unified Wireless IP Phone 7921G in a WLAN infrastructure?()
A . enable aggressive load balancing
B . enable coverage hole detection
C . disable dynamic transmit power control
D . enable short preamble
-
Oracle Net Configuration Assistant is a post-installation tool that configures basic network components after installation. Which four components are included in the configuration?()
A . Directory server
B . Hostname adaptor
C . TCP/IP host file
D . Connection Manager
E . connecting pooling
F . external procedures
G . listener names and protocol addresses
H . Net Service names in a tnsnames.ora file
I . naming methods the client uses to resolve connect identifier
-
What is the minimum configuration you must do in order to enable multicast support on the CiscoWireless LAN Controller v5.2?()
A . Enable the IGMP snooping capability and define the IGMP timeout period.
B . Set the Ethernet multicast mode to Enabled, enable the IGMP snooping capability, and define the IGMP timeout period.
C . Set the multicast monitor function to Enabled, enable the IGMP snooping capability, and define the mandatory data rate to the minimum value supported.
D . Set the Ethernet multicast mode to Multicast and define the multicast group address.
-
Which three IPCCX configuration steps are only available in the IPCC Express Enhanced or Premium edition? ()
A . Create Resource Groups
B . Create Skills
C . Assign Resource Groups and Skills to Agents
D . Create Contact Service Queues
E . Provision Remote Monitoring
F . Provision Agent-based Routing&e
-
Click the Exhibit button.In the exhibit, what is the function of the configuration statements?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/9e4bb10af679f8698024701bdbe32cdc.jpg' />
A. This section is where you define all chassis clustering configuration.
B. This configuration is required for members of a chassis cluster to talk to each other.
C. You can apply this configuration in the chassis cluster to make configuration easier.
D. This section is where unique node configuration is applied.
-
Referring to the exhibit, which type of classifier is being used in this CoS configuration?()
<img src='https://img2.soutiyun.com/shangxueba/ask/64230001-64233000/64232957/36aff23b50569b62a71f897b58db5f71.jpg' />
A. behavior aggregate
B. policer
C. multifield
D. forwarding policy
-
Which configuration command is used to send debug level events to the console in real time?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/26702676062fb859e8189d08761485ce.jpg' />
A.A
B.B
C.C
D.D
-
Based on the configuration shown in the exhibit, what will happen to the traffic matching the securitypolicy?()
<img src='https://img2.soutiyun.com/ask/uploadfile/2019-03-27/704fc9c0bf245b262abb1fe3ed2d7849.jpg' />
A. The traffic is permitted through the myTunnel IPSec tunnel only on Tuesdays.
B. The traffic is permitted through the myTunnel IPSec tunnel daily, with the exception of Mondays.
C. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 7:00 am and 6:00 pm, and Thursdays between 7:00 am and 6:00 pm.
D. The traffic is permitted through the myTunnel IPSec tunnel all day on Mondays, Wednesdays between 6:01 pm and 6:59 am, and Thursdays between 6:01 pm and 6:59 am.