Which three features are part of the Cisco Compatible Extensions program?
Which three features are part of the Cisco Compatible Extensions program? (Choose three.)
Select 3 response(s).
Which two statements are true about trust boundaries?
Which two statements are true about trust boundaries? (Choose two.) Select 2 response(s).
Which two statements are true about the operation of voice VLANs on a Catalyst switch?
Which two statements are true about the operation of voice VLANs on a Catalyst switch? (Choose two.)
Select 2 response(s).
What is the effect of enabling a voice VLAN on a Catalyst switch port?
What is the effect of enabling a voice VLAN on a Catalyst switch port?
Select the best response.
What are two methods of mitigating MAC address flooding attacks?
What are two methods of mitigating MAC address flooding attacks? (Choose two.) Select 2 response(s).
Which two codecs are supported by Cisco VoIP equipment?
Which two codecs are supported by Cisco VoIP equipment? Select the best response.
Which procedure would best defend against this type of attack?
An attacker is launching a DoS attack with a public domain hacking tool that is used to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack? Select the best response.
Which two statements about WLAN components are true?
Which two statements about WLAN components are true? (Choose two.) Select 2 response(s).
Which two statements about a wireless repeater topology are true?
Which two statements about a wireless repeater topology are true? (Choose two.) Select 2 response(s).
Which two statements about HSRP priority are true?
Which two statements about HSRP priority are true? (Choose two.) Select 2 response(s).