Which process sorts traffic and can expedite or drop traffic according to a defined policy?
A. behavioral modeling
B. provisioning, monitoring, and management
C. queuing and WRED
D. NBAR
Which versatile, high-performance product provides up to three times better performance for IPsec on the ISR than without the product?
A. Cisco VPN ISM
B. Cisco NCE
C. Cisco NSE
D. Cisco ASA
Which WAN topology can support more than two endpoints?
A. FHRP
B. NBMA
C. VRRP
D. B.A.T.M.A.N.
Which two are components of Cisco PfR? (Choose two.)
A. master controller
B. master browser
C. border router
D. edge router
E. area of service
In which way does Cisco PfRv2 active monitoring work to ensure link quality?
A. by generating synthetic data of each application type and monitoring for any link issues
B. by generating generic synthetic data and monitoring for any link issues
C. by listening to all traffic on the link for any issues
D. by listening to application-specific traffic on the link and monitoring for any link issues
With HQF, which minimum percentage must be assigned to class-default?
A. 0.01
B. 0.10
C. 0.25
D. 1.00
In which three ways are IPv6 addresses allocated? (Choose three.)
A. DHCP
B. static
C. PA
D. ARP
E. PI
F. APIPA
G. ULA
How is a TrustSec tag used with a site-to-site VPN?
A. by being passed separately along with packet
B. by being preserved in the GRE/IPsec VPN header
C. by being marked as a TrustSec packet
D. by being added to the data packet
Cisco Threat Defense is based on which product?
A. Adaptive Security Appliance
B. Lancope StealthWatch
C. Plixer Scrutinizer
D. SoftPerfect Network Scanner
What should you do to all three planes of the Cisco IOS router?
A. leave them at the default settings, to provide best functionality
B. protect them with an antivirus solution
C. harden them, using Cisco Guide to Harden Cisco IOS Devices
D. verify them, using the Cisco IOS verification tool