What is fading?
What is fading? A. Another signal source is producing energy on the channel in which you are trying to operate. B. The desired signal reaches the receiving antenna via multiple paths, each of which has a different propagation delay and path loss. C. A time-varying change in the path loss of a link with the […]
Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature?
Which limitation applies to the use of the Cisco WLAN Solution Management over Wireless feature? A. Controllers must be managed using only secure protocols (that is, SSH and HTTPS), not nonsecure protocols (that is, HTTP and Telnet) B. Read-write access is not available; only read-only access is supported. C. Uploads and downloads from the controller […]
Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code?
Up to how many Cisco WiSMs are supported in a single mobility group operating under v5.0 code? A. 5 B. 12 C. 16 D. 24 E. 150 F. 300
What default alarm level is used to display all rogue APs in the Alarm Summary?
The existing Cisco Unified Wireless Controller is running v5.0 code for both the controllers and the Cisco WCS. A controller has been configured with an appropriate rogue rule condition to report discovered APs to the Cisco WCS. What default alarm level is used to display all rogue APs in the Alarm Summary? A. Critical B. […]
What could be possible causes for the "Serial0/0 is down" interface status?
What could be possible causes for the “Serial0/0 is down” interface status? (Choose two.) A. A Layer 1 problem exists. B. The bandwidth is set too low. C. A protocol mismatch exists. D. An incorrect cable is being used. E. There is an incorrect IP address on the Serial 0/0 interface.
Which two destination addresses will host 4 use to send data to host 1?
Both switches are using a default configuration. Which two destination addresses will host 4 use to send data to host 1? (Choose two.) A. the IP address of host 1 B. the IP address of host 4 C. the MAC address of host 1 D. the MAC address of host 4 E. the MAC address […]
Which will be necessarily taken into consideration when implementing Syslogging in your network?
As a network engineer at Cisco.com, you are responsible for Cisco network. Which will be necessarily taken into consideration when implementing Syslogging in your network? A. Log all messages to the system buffer so that they can be displayed when accessing the router. B. Use SSH to access your Syslog information. C. Enable the highest […]
Which classes does the U.S. government place classified data into?
Which classes does the U.S. government place classified data into? (Choose three.) A. SBU B. Confidential C. Secret D. Top-secret Explanation/Reference: Table: Government and Military Data Classification:
Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure devic
You are a network technician at Cisco.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management? A. All vty ports are automatically enabled for SSH to provide secure management. B. The SSH protocol is automatically enabled. C. You must then zeroize the keys to […]
What will you do at PG-R5 to solve this problem?
Based on the exhibit presented. PG-R2 does not have any 10.100.x.x routes in either its routing table or its BGP table. What will you do at PG-R5 to solve this problem?