Refer to the exhibits:Exhibit 1 -Exhibit 2 -A network administrator at a university notices high utilization on links between the access layer and core. The output shown in the exhibit is characteristic of samples taken several times an hour during congestion. The administrator suspects file sharing and other unauthorized traffic, and decides to use an ACL to permit only HTTP, HTTPS, and a few other authorized types of traffic.How can the administrator apply the ACL to address both the security and the congestion problem?
A network administrator needs to configure an AOS-Switch to classify traffic. Comparing QoS policy and global policy, what is one function that only a class-basedQoS policy can fulfill?
A company requires AOS-Switches at the campus core. The switches:✑ Will act as the default gateways for several campus VLANs✑ Must provide redundancy for their services and tolerate the loss of a link or an entire switch✑ Must recover from the failure of one of the switches within a second or lessVRRP and MSTP are proposed to meet these requirements. What is an issue with this proposal?
An AOS-Switch needs to implement tunneled node in role-based mode. Aruba ClearPass is configured to assign users for which the traffic should be tunneled to a group to these users.What is the correct user role configuration on the AOS-Switch for this scenario? set as the secondary role in the tunneled-node-redirect command set as the secondary role in the tunneled-node-redirect command
Refer to the exhibit.A network administrator sets up prioritization for an application that runs between Device 1 and Device 2. However, the QoS for the application is not what the administrator expects.How can the administrator check if the network infrastructure prioritizes traffic from Device 1 and Device 2?
A network administrator applies port security to a port with the send-alarm action. What does the switch do if it detects traffic from an unauthorized MAC address on the port?