A. Short, easy-to-decipher passwords will be rejected.
B. Passwords become case-sensitive.
C. The strength of existing passwords will be checked.
D. Special characters, such as the dollar sign ($) or the percent sign (%), will not be allowed.
A. domain parameters
B. AAA
C. virtual switches
D. VSS
A. device alias distribution
B. Kerberos proxy distribution
C. RSA key pair distribution
D. DPVM configuration distribution
E. VLAN database distribution
A. IGMP version 2
B. IGMP version 1
C. IGMP version 3
D. PIM
A. Adding additional bandwidth is handled dynamically using the 802.1AX protocol.
B. FabricPath uses hardware bonding of physical interfaces to form higher-speed links.
C. Links between the same set of switches are automatically added to a port channel.
D. Traffic is load shared automatically across the available paths to the destination.
A. Traffic can either be permitted or denied among members of the default zone. This information is not distributed to all switches. It must be configured in each switch.
B. To activate a zone set, you must copy the running configuration to the startup configuration after the zone set is configured.
C. Soft zoning restrictions will not prevent a source device from accessing a device outside its zone, if the source knows the Fibre Channel ID of the destination.
D. Hard zoning is enforced by the hardware on each FLOGI sent by an N Port.
E. Unlike configured zones, default zone information is not distributed to the other switches in the fabric.
F. The settings for default zone configurations cannot be changed.
A. FCoE logical endpoint
B. distributed FCF
C. Fibre Channel forwarder
D. FCoE node
E. FCoE forwarder
A. VM snapshot
B. resource reservations
C. ERSPAN
D. NetFlow
E. high availability
A. ACLs
B. SPAN sessions
C. RBAC users
D. IPv4 routes
E. IPv6 routes
F. NAT entries
A. IP source guard
B. NAC
C. traffic storm control
D. DHCP snooping
E. Dynamic ARP Inspection
F. CoPP