Which multicast address does OSPF use to send hello packets?

 
 
 
 

Which of the following is an addressing type that is assigned to network interfaces for communications on the physical network segment?

 
 
 
 

The Cisco Catalyst 1900 switches support which three LAN switch types? [Select 2].

 
 
 
 

What is the alternative notation for the IPv6 address B514:82C3:0000:0000:0029:EC7A:0000:EC72?

 
 
 
 

The wireless network is using controller-based APs and version 7.0 MR1. The APs appear to be connected properly to the controllers. A wireless user near one of the APs reports that they are unable to connect to the network with their pre-shared key. Which option shows the GUI path where you can check the connection status of that client?

 
 
 
 

Which option is a desirable feature of using symmetric encryption algorithms?

 
 
 
 

In a Cisco UCM single-site deployment, what is the maximum number of IP phones that can register with a UCM cluster?

 
 
 
 

On Cisco IOS XR, for which purpose is the turboboot procedure used?

 
 
 
 

When deploying 10BASE-2 Ethernet, what is the maximum cable length?

 
 
 
 

The ROUTE Company has a small network. The network consists of one switch and one router. The switch has been configured with two VLANs. The router has been configured as a router-on- a-stick to allow inter- VLAN routing. A trunk is configured to connect the switch to the router. What is the minimum number of router subinterfaces that are required for all the VLANs to communicate?

 
 
 
 

Which of the following about an infrastructure basic service set is true according to IEEE 802.11 specifications?

 
 
 
 

Which option is a key principle of the Cisco Self-Defending Network strategy?

 
 
 
 

By default, how many failed attempts at signing into Cisco Unity Connection is a user allowed before their account is locked out?

 
 
 
 

Which of the following about STP operations is true?

 
 
 
 

How many IP address ranges are specified in RFC 1918?

 
 
 
 

You are working in a data center environment and are assigned the address range 10.188.31.0/23. You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each. Which IP address range meets these requirements?

 
 
 
 

Which method of encryption does the 802.11i standard use?

 
 
 
 
 

Which threats are the most serious?

 
 
 
 

What device enables Call Admission Control in a CME environment?

 
 
 
 

Which of the following is true about SSH?

 
 
 
 

What action does a switch take if the destination MAC address is unknown?

 
 
 
 

Which of these applications uses the IMAP protocol to transfer information between a server and a host?

 
 
 
 

Which of the following topologies is used in Wide Area Networks (WANs)?

 
 
 
 

How does VLSM make IP addressing more efficient?



 
 
 
 

Which layer in the Open Systems Interconnection (OSI) model enables coding and conversion functions for application layer data?

 
 
 
 

What is the primary motivation for most attacks against networks today?

 
 
 
 

Which type of Category 5 unshielded twisted-pair (UTP) cable is used to work as a trunk between two switches?

 
 
 
 

ARP spoofing attacks depend on the use of what message?

 
 
 
 

What type is not supported on Cisco routers?

 
 
 
 

You are working with an Internet Service Provider (ISP) as network manager. A corporate client approaches you to lease a public IP subnet that can accommodate 250 users. You have assigned him the 192.25.27.0 subnet.

What subnet mask should be assigned to this IP address so that it can accommodate the number of users required by the corporate client?

 
 
 
 

Question 1 of 30