Which protocols were used during the test?
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two.)
What is a valid reason for a switch to deny port access to new devices when port security is enabled?
What is a valid reason for a switch to deny port access to new devices when port security is enabled?
What is one reason that WPA encryption is preferred over WEP?
What is one reason that WPA encryption is preferred over WEP?
Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)
What is the best course of action if the company wants to have 40 hosts in each of the three subnets?
A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1. The company network is using the block of 198.133.219.0/24. The company has decided it would be a good idea to split the network into three smaller subnets and create the option of conseiving addresses with VLSM. What is the best course of action if the company wants to have 40 hosts in each of the three subnets?
which parameter must be configured on the access point in order to allow a wireless client to operate on it?
You have finished physically installing an access point on the ceiling at your office. At a minimum, which parameter must be configured on the access point in order to allow a wireless client to operate on it?
How is an EUI-64 format interface ID created from a 48-bit MAC address?
How is an EUI-64 format interface ID created from a 48-bit MAC address?
Which are valid modes for a switch port used as a VLAN trunk?
Which are valid modes for a switch port used as a VLAN trunk? (Choose three.)
What is the purpose using the traceroute command?
What is the purpose using the traceroute command?
Which additional configuration step is necessary in order to connect to an access point that has SSID broadcas
Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?