-
When configuring cisco secure acs to support wireless eap authentication,which device must be configured as a aaa client?()
A . location appliance
B . controller-based access points
C . wireless clients
D . wireless control system
E . wireless controller
-
Which of these is mandatory when configuring Cisco IOS Firewall? ()
A . Cisco IOS IPS enabled on the untrusted interface
B . NBAR enabled to perform protocol discovery and deep packet inspection
C . a route map to define the trusted outgoing traffic
D . a route map to define the application inspection rules
E . an inbound extended ACL applied to the untrusted interface
-
When configuring Frame Relay using point-to-point subinterfaces, which of the following must not be configured?()
A . The local DLCI on each subinterface of the Frame Relay.
B . The Frame Relay encapsulation on the physical interface.
C . An IP address on the physical interface.
D . The subinterface type as point-to-point
-
Which two locations can be configured as a source for the IOS image in the boot system command?()
A . RAM
B . NVRAM
C . flash memory
D . HTTP server
E . TFTP server
F . Telnet server
-
You are trying to deploy a configuration job to an IOS access point using the WLSE, but the jobfails. Which of the following would cause this failure?()
A . SNMP communities
B . Telnet/SSH user/password
C . WLCCP credentials
D . HTTP user/password
-
In which Cisco IOS configuration mode is the route distinguisher (RD) configured?()
A . R1(config-route-at)#
B . R1(config-route-map)#
C . R1(config-it)#
D . R1(config-vrf)#
E . R1(config)#
F . R1(router)#
-
When configuring Cisco IOS login enhancements for virtual connections, what is the "quiet period"?()
A . The period of time in which virtual login attempts are blocked, following repeated failed login attempts
B . The period of time in which virtual logins are blocked as security services fully initialize
C . A period of time when no one is attempting tolog in
D . The period of time between successive login attempt
-
When the Cisco IOS OSPF command ip ospf dead-interval minimal hello-multiplier 5 is configured, which two statements are true? ()
A . OSPF hello interval is 5 seconds
B . OSPF hello interval is 1 second
C . OSPF dead interval is 1 second
D . OSPF dead interval is 5 seconds
E . OSPF dead interval is 20 seconds
F . OSPF hello interval is 0.2 second
-
Which IOS commands can a network technician use to verify all RIP, IGRP,EIGRP, and OSPF routing protocol configurations?()
A . debug ip routing
B . show running-config
C . show ip route protocols
D . show ip protocols
E . show protocols al
-
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()
A . All defined VLANs are allowed on the trunk by default.
B . Each VLAN, or VLAN range, that is specified with the switchport mode command.
C . Each VLAN, or VLAN range, that is specified with the vtp domain command.
D . Each VLAN, or VLAN range, that is specified with the vlan database command.
-
When upgrading the IOS image, the network administrator receives the exhibited error message. What could be the cause of this error?()
A . The new IOS image is too large for the router flash memory.
B . The TFTP server is unreachable from the router.
C . The new IOS image is not correct for this router platform.
D . The IOS image on the TFTP server is corrupt.
E . There is not enough disk space on the TFTP server for the IOS image.
-
Which three statements accurately describe IOS Firewall configurations?()
A . The IP inspection rule can be applied in the inbound direction on the secured interface
B . The IP inspection rule can be applied in the outbound direction on the unsecured interface
C . The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.
D . For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL
-
Which IOS command would you enter if you wanted to view a list of IBGP and EBGP neighborrelationships that are configured?()
A . show ip bgp
B . show ip bgp paths
C . show ip bgp peers
D . show ip bgp summary
E . show ip bgp protocol
-
When configuring Cisco Secure ACS to support wireless EAP authentication, which device must be configured as a AAA client?()
A . Wireless Control System
B . wireless clients
C . wireless controllers
D . controller-based access points
E . Location Appliance
-
Which IOS security feature is configured by the ip inspect inspection-name {in out} command?()
A . IPsec site-to-site VPN
B . Cisco AutoSecure
C . Cisco IOS Firewall
D . IPS
-
When configuring private VLANs, which configuration task must you do first?()
A . Configure the private VLAN port parameters.
B . Configure and map the secondary VLAN to the primary VLAN.
C . Disable IGMP snooping.
D . Set the VTP mode to transparent.
-
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()
A . TCP/IP
B . Multiprotocol
C . Named Pipes
D . NWLink IPX/SPX
-
You are trying to deploy a configuration job to an ios access point using the wlse, but the job fails. Which of the following would cause this failure?()
A . snmp communities
B . telnet/ssh user/password
C . wlccp credentials
D . http user/password
-
When configuring system state conditions with the Cisco SecurityAgent, what is the resulting action when configuring more than one system state condition? ()
A . Any matching state condition will result with the state being triggered
B . Once a state condition ismet, the system ceases searching further conditions and will cause the state condition to trigger
C . All specified state conditions are used as part of the requirements tobe met to for the state to trigger
D . Once the state conditions are met, they become persistent and can only be removed using the Reset feature
-
You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure it to be installed in a high availability network. On a 3560 EMI switch, which three types of interfaces can be used to configure HSRP?()
A . SVI interface
B . Access port
C . EtherChannel port channel
D . Loopback interface
E . Routed port
F . BVI interface
-
Which three statements about IOS Firewall configurations are true?()
A . The IP inspection rule can be applied in the inbound direction on the secured interface.
B . The IP inspection rule can be applied in the outbound direction on the unsecured interface.
C . The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
D . The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
E . For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
F . For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
-
Which three of the following steps are mandatory when configuring MPLS on Cisco IOS? ()(Choose three.)
A . start LDP
B . enable CEF switching
C . configure the MPLS ID
D . disable IP TTL propagation
E . configure conditional label advertising
F . enable label switching on frame mode interface
-
Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
A . A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
B . An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
C . Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
D . Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
E . The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
F . The SDM provides a basic, intermediate, and advanced firewall wizard.
-
Which does not need to be configured on ZXCTN6100 when performing basic configuration
A.A.UNI interface configuratio
B.B.Static MAC configuratio
C.C.configuratio
D.D.VLAN interface configuratio