Flexible NetFlow has the ability to view both key and nonkey fields. What is one example of a key field?
packet data
destination IP
routing source
timestamp sys-uptime last
What is one example of a supported hypervisor on the network compute engine?
Red Hat KVM
VMware vSphere Hypervisor 5.1
CentOS qemu
VMware Workstation 10.0
Which two characteristics comprise a hybrid WAN design? (Choose two.)
L2TP VPN
premium transport (MPLS)
dial-up modem
best-effort transport (Internet)
static routing protocol
What is the primary characteristic of Cisco WAAS Express?
application-centric
link optimizer
not supported in Cisco IWAN
protocol-agnostic
Which routing protocol is typically used to peer with an MPLS provider?
RIP
EIGRP
IGP
eBGP
Which type of traffic does Akamai deliver?
web
Internet
branch
WAN
On what is the Cisco security approach based?
attack lifecycle
first-hop security
the inability of cyber criminals to exploit zero-day vulnerabilities
deployment of traditional security architecture that eliminates cyber threats within a campus or branch
Which unique feature of TrustSec is used for end-to-end security policy control?
zoning
mapping
masking
tagging
What is Cisco Cloud Connector?
a specialized hardware appliance, to enable cloud adoption
software on or integrated with Cisco Enterprise routers, to enable or enhance a cloud service
third-party software that is installed on an operating system, to make cloud services work
a virtual appliance
TESTED 22 Dec 2024
Copyright © 2014-2024 DumpsBuddy. All Rights Reserved