129 what does the lap send when multiple wlcs respond

Doc Preview
Pages 100+
Identified Q&As 100+
Solutions available
Total views 100+
129. What does the LAP send when multiple WLCs respond to the CISCO_CAPWAP-CONTROLLER.localdomain hostname during the CAPWAP discovery and join process? A. broadcast discover request B. join request to all the WLCs C. unicast discovery request to each WLC D. Unicast discovery request to the first WLC that resolves the domain name Correct Answer:C Explanation:Reference:Here 130. Refer to the exhibit. Create PDF in your applications with the PdfcrowdHTML to PDF APIPDFCROWD
What is the result when a technician adds the monitor session 1 destination remote vlan 233 command? A. The RSPAN VLAN is replaced by VLAN 223 B. RSPAN traffic is sent to VLANs 222 and 223 C. An error is flagged for configuring two destinations D. RSPAN traffic is split between VLANs 222 and 223 Correct Answer:A 131. In an SD-Access solution what is the role of a fabric edge node? A. to connect external Layer 3- network to the SD-Access fabric B. to connect wired endpoint to the SD-Access fabric C. to advertise fabric IP address space to external network D. to connect the fusion router to the SD-Access fabric Correct Answer:B Explanation:+ Fabric edge node: This fabric device (for example, access or distribution layer device) connects wired endpoints to the SDA fabric. Create PDF in your applications with the PdfcrowdHTML to PDF APIPDFCROWD
132. Refer to the exhibit. access-list 1 permit 172.16.1.0 0.0.0.255 ip nat inside source list 1 interface gigabitethernet0/0 overlo Create PDF in your applications with the PdfcrowdHTML to PDF APIPDFCROWD
The inside and outside interfaces in the NAT configuration of this device have been correctly identified. What is the effect of this configuration? A. dynamic NAT B. static NAT C. PAT D. NAT64 Correct Answer:C Explanation:The command “ip nat inside source list 1 interface gigabitethernet0/0 overload” translates all source addresses that pass access list 1, which means 172.16.1.0/24 subnet, into an address assigned to gigabitethernet0/0 interface. Overload keyword allows to map multiple IP addresses to a single registered IP address (manyto-one) by using different ports so it is called Port Address Translation (PAT). 133. Which component of the Cisco Cyber Threat Defense solution provides user and flow context analysis? A. Cisco Firepower and FireSIGHT B. Cisco Stealth watch system C. Advanced Malware Protection D. Cisco Web Security Appliance Correct Answer:B Explanation: The goal of the Cyber Threat Defense solution is to introduce a design and architecture that can help facilitate the discovery, containment, and remediation of Create PDF in your applications with the PdfcrowdHTML to PDF APIPDFCROWD
threats once they have penetrated into the network interior. Cisco Cyber Threat Defense version 2.0 makes use of several solutions to accomplish its objectives: * NetFlow and the Lancope StealthWatch System – Broad visibility – User and flow context analysis – Network behavior and anomaly detection – Incident response and network forensics * Cisco FirePOWER and FireSIGHT – Real-time threat management
Course Hero Badge

Want to read all 354 pages?

Previewing 124 of 354 pages Upload your study docs or become a member.
Course Hero Badge

Want to read all 354 pages?

Previewing 124 of 354 pages Upload your study docs or become a member.
Course Hero Badge

End of preview

Want to read all 354 pages? Upload your study docs or become a member.