PrepAway - Latest Free Exam Questions & Answers

Author: admin

Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?

Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature? A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet) B. Read-write access is not available; only read-only access is supported. C. Uploads and downloads from the controller […]

Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code?

Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code? A. 5 B. 12 C. 16 D. 24 E. 150 F. 300

What could be possible causes for the "Serial0/0 is down" interface status?

What could be possible causes for the “Serial0/0 is down” interface status? (Choose two.) A. A Layer 1 problem exists. B. The bandwidth is set too low. C. A protocol mismatch exists. D. An incorrect cable is being used. E. There is an incorrect IP address on the Serial 0/0 interface.

Which two destination addresses will host 4 use to send data to host 1?

Both switches are using a default configuration. Which two destination addresses will host 4 use to send data to host 1? (Choose two.) A. the IP address of host 1 B. the IP address of host 4 C. the MAC address of host 1 D. the MAC address of host 4 E. the MAC address […]

Which will be necessarily taken into consideration when implementing Syslogging in your network?

As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest […]

Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic

You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]


Page 255 of 396« First...102030...253254255256257...260270280...Last »