PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which three items are Cisco best-practice recommendations for securing a network?

Which three items are Cisco best-practice recommendations for securing a network? (Choose three.) A. Deploy HIPS software on all end-user workstations. B. Routinely apply patches to operating systems and applications. C. Disable unneeded services and ports on hosts. D. Require strong passwords, and enable password expiration.

if you input the command “enable secret level 5 password” in the global mode , what does it indica

As a candidate for CCNA examination, when you are familiar with the basic commands, if you input the command "enable secret level 5 password" in the global mode , what does it indicate? A. Set the enable secret command to privilege level 5. B. The enable secret password is hashed using SHA. C. The enable […]

When a Cisco switch supply PoE to an IP phone?

Power over Ethernet (PoE) is the ability for the LAN switching infrastructure to provide power over a copper Ethernet cable to an endpoint (Powered Device). This capability, once referred to as "inline power", was originally developed and first delivered by Cisco in 2000 to support the emerging IP Telephony deployments. IP Telephones, like desktop PBX […]

Which Cisco Unified Communications layer is the call processing layer?

Which Cisco Unified Communications layer is the call processing layer? A. Layer A including video,communications client, software-based phones, IP Phone B. Layer B including Voice mail,Presence,Contact Center C. Layer C including Cisco Unified Communications manger,Directory Server. D. Layer D including Gateway, Router, Switch.

Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic

You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]


Page 254 of 396« First...102030...252253254255256...260270280...Last »