What does the “authoritative” flag in the show ip nhrp command output indicate?
What does the “authoritative” flag in the show ip nhrp command output indicate?
Which two of these correctly describe the following command?
Which two of these correctly describe the following command? (Choose two.)
aaa authentication ppp user-radius if-needed group radius
Which international organization charters the activity of IETF?
The Internet Engineering Task Force (IETF) is a collaborative effort (nonprofit) by the international community of Internet professionals to improve the design, use, and management of the Internet. Which international organization charters the activity of IETF?
Which of these could be the issue?
The network administrator has created two network access control rules in Cisco Security Agent in order to block NetBIOS traffic; however, traffic is still passing and Cisco Security Agent is not filtering it. Which of these could be the issue?
which of these?
When sending an e-mail message using Simple Mail Transfer Protocol (SMTP), the client must signal to the mail server that the message is complete by terminating the message with which of these?
What could be the potential problem?
You are trying to set up a site-to-site IPsec tunnel between two Cisco ASA adaptive security appliances, but you are not able to pass traffic. You try to troubleshoot the issue by enabling debug crypto isakmp and see the following messages:
CiscoASA# debug crypto isakmp
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Tunnel Rejected: Conflicting protocols specified by tunnel-group and group-policy
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, QM FSM error (P2 struct &0xb0cf31e8, mess id 0x97d965e5)!
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Removing peer from correlator table failed, no match!
What could be the potential problem?
Which of these Cisco IOS features implements a simple packet filter?
Which of these Cisco IOS features implements a simple packet filter?
What will this configuration for an IDSM-2 module do?
What will this configuration for an IDSM-2 module do?
intrusion-detection module 6 management-port access-vlan 36
intrusion-detection module 6 data-port 1 capture
intrusion-detection module 6 data-port 1 capture allowed-vlan 1-10, 36, 124
!
vlan access-map IDSM-2 10
match ip address 150
action forward capture
vlan access-map IDSM-2 20
match ip address 151
action forward
!
vlan filter IDSM-2 vlan-list 1 -10, 36, 124
!
access-list 150 permit tcp any 10.1.1.0 0.0.0.255
access-list 151 permit ip any any
which three of these goals?
With proper Cisco Secure Desktop configuration, you can achieve which three of these goals? (Choose three.)
Which OSPF LSA type is generated by the ABR to describe a route to neighbors outside the area?
Which OSPF LSA type is generated by the ABR to describe a route to neighbors outside the area?