which two pieces of information should you have obtained previously to assist in designing the solution?
When creating a network security solution, which two pieces of information should you have
obtained previously to assist in designing the solution? (Choose two.)
Which of the following technologies would an Internet Service Provider use to support overlapping customer VLA
Which of the following technologies would an Internet Service Provider use to support
overlapping customer VLAN ID’s over transparent LAN services?
What action should you be prepared to take when verifying a security solution?
What action should you be prepared to take when verifying a security solution?
what would you have to include at the end of the link for the trunk to operate correctly?
If you were to configure an ISL Ethernet trunk between two Cisco switches, named R1 and
R2, what would you have to include at the end of the link for the trunk to operate correctly?
(Select two)
what is the maximum number of secure MAC addresses that should be set on the port?
When you enable port security on an interface that is also configured with a voice VLAN,
what is the maximum number of secure MAC addresses that should be set on the port?
which of the following statement are correct?
You are the network administrator at Company and switch R1 is configured as shown below:
Interface gigethernet 0/1
Switchport mode trunk
Switchport trunk encapsulation dot1q
Switchport trunk native vlan 5
If untagged frames are arriving on interface gigethernet 0/1 of R1, which of the following
statement are correct?
what can be determined?
which trunk mode would you set the local port to on R1 if you wanted it to respond to requests from its link p
If you were to set up a VLAN trunk over a Fast Ethernet link on switch R1, which trunk mode
would you set the local port to on R1 if you wanted it to respond to requests from its link
partner (R2) and become a trunk?
what does the command aaa new-model enable?
By itself, what does the command aaa new-model enable?
Which of the following trunking modes are unable to request their ports to convert their links into trunk link
Which of the following trunking modes are unable to request their ports to convert their links
into trunk links? (Select all that apply)