Which three items are Cisco best-practice recommendations for securing a network?
Which three items are Cisco best-practice recommendations for securing a network? (Choose three.) A. Deploy HIPS software on all end-user workstations. B. Routinely apply patches to operating systems and applications. C. Disable unneeded services and ports on hosts. D. Require strong passwords, and enable password expiration.
Which method is of gaining access to a system that bypasses normal security measures?
Which method is of gaining access to a system that bypasses normal security measures? A. Creating a back door B. Starting a Smurf attack C. Conducting social engineering D. Launching a DoS attack
if you input the command “enable secret level 5 password” in the global mode , what does it indica
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command "enable secret level 5 password" in the global mode , what does it indicate? A. Set the enable secret command to privilege level 5. B. The enable secret password is hashed using SHA. C. The enable […]
When a Cisco switch supply PoE to an IP phone?
Power over Ethernet (PoE) is the ability for the LAN switching infrastructure to provide power over a copper Ethernet cable to an endpoint (Powered Device). This capability, once referred to as "inline power", was originally developed and first delivered by Cisco in 2000 to support the emerging IP Telephony deployments. IP Telephones, like desktop PBX […]
What is the default VTP mode on Cisco switches?
What is the default VTP mode on Cisco switches? A. Master B. Client C. Backup D. Server
Which Cisco Unified Communications layer is the call processing layer?
Which Cisco Unified Communications layer is the call processing layer? A. Layer A including video,communications client, software-based phones, IP Phone B. Layer B including Voice mail,Presence,Contact Center C. Layer C including Cisco Unified Communications manger,Directory Server. D. Layer D including Gateway, Router, Switch.
Which two MFP requirements protect the network?
Cisco Client Management Frame Protection is running on a mobility group with two controllers. Which two MFP requirements protect the network? (Choose two.) A. forces clients to authenticate, using a secure EAP method only B. implements the validation of wireless management frames C. requires CCXv5 D. requires the use of anonbroadcast SSID E. requires CCXv4
Which type of voice port you will configure a voice port that will allow the gateway to terminate 23 or 30 cir
You are CCNA VOICE associate in Certkey.com. You need configure a voice port that will allow the gateway to terminate 23 or 30 circuits from the PSTN. Which type of voice port you will configure? A. BRI B. FXS C. PRI T1/E1 D. E&M
Which of the following is selected first for an incoming dial peer?
Which of the following is selected first for an incoming dial peer? A. Answer-address B. incoming called-number C. destination-pattern D. pots port
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]