Which of the following is not a valid IPv6 address type?
Which of the following is not a valid IPv6 address type?
Which two statements are true regarding the trust state configuration of a switch port?
To avoid classification at all switches within a QoS domain, a switch port may be configured in a
trusted state. Which two statements are true regarding the trust state configuration of a switch
port? (Choose two.)
Which aggregate of the IPv6 addresses 2001:0303:0000:5000:0000:052B:0000:0000/96 and 2001:0303:0000:5000:0000:
Which aggregate of the IPv6 addresses 2001:0303:0000:5000:0000:052B:0000:0000/96 and
2001:0303:0000:5000:0000:052C:0000:0000/96 has the longest possible mask?
Which two protocols or processes can be used for a switched network to control distribution of multicast traff
Which two protocols or processes can be used for a switched network to control distribution of
multicast traffic at Layer 2? (Choose two.)
Which configuration fulfills all the requirements?
A router has two interfaces: Ethernet 0 is connected to the LAN and Ethernet 1 is connected to the
Internet. The LAN is 20.20.20.0/24. All hosts on the LAN must be able to form TCP connections to
any host on the Internet. Hosts on the Internet may not form TCP connections to hosts on the
LAN, except to port 25 of a mail server on the LAN. The web server IP address is 20.20.20.100.
Which configuration fulfills all the requirements?
Which three statements about the interface types of the controllers are true?
Cisco WiSM controllers have multiple interface types. Which three statements about the interface
types of the controllers are true? (Choose three.)
Which of the below DHCP options needs to be configured?
You have 2 WLCs with management IP addresses of 192.168.11.5 and 192.168.11.6 respectively.
Your APs reside on a different subnet. Which of the below DHCP options needs to be configured?
Which two statements about the IPv4 ToS byte are true?
Which two statements about the IPv4 ToS byte are true? (Choose two.)
Which three protocols does IEEE 802.1X access control allow until the client is authenticated?
Which three protocols does IEEE 802.1X access control allow until the client is authenticated?
(Choose three.)
Which two interfaces must be present and configured at setup time?
Cisco WiSM controllers have multiple interface types. Which two interfaces must be present and
configured at setup time? (Choose two.)