Which two of the following devices could you configure as a source for the IOS image in the boot system command?

Correct Answer for the Question – Which two of the following devices could you configure as a source for the IOS image in the boot system command? is given below Cisco IOS (originally Internetwork Operating System) is the software used on the vast majority of Cisco Systems routers and all current Cisco network switches.Which two of … Read more

What types of packets will be permitted by this ACL?

Correct Answer for the Question – What types of packets will be permitted by this ACL? is given below An inbound access list has been configured on a serial interface to deny packet entry for TCP and UDP ports 21, 23 and 25.What types of packets will be permitted by this ACL? (Choose three.) HTTP FTP … Read more

What is the best course of action if the company wants to have 40 hosts in each of the three subnets?

Correct Answer for the Question – What is the best course of action if the company wants to have 40 hosts in each of the three subnets? is given below A medium-sized company has a Class C IP address. It has two Cisco routers and one non-Cisco router. All three routers are using RIP version 1.The … Read more

Which statements describe two of the benefits of VLAN Trunking Protocol?

Correct Answer for the Question – Which statements describe two of the benefits of VLAN Trunking Protocol? is given below Which statements describe two of the benefits of VLAN Trunking Protocol? (Choose two.) VTP allows routing between VLANs. VTP allows a single switch port to carry information to more than one VLAN. VTP allows physically redundant … Read more

Which command would correctly configure a serial port on a router with the last usable host address in the 192.216.32.32/29 subnet?

Correct Answer for the Question – Which command would correctly configure a serial port on a router with the last usable host address in the 192.216.32.32/29 subnet? is given below Which command would correctly configure a serial port on a router with the last usable host address in the 192.216.32.32/29 subnet? router (config-if)# ip address 192.216.32.38 … Read more

Which two statements apply to dynamic access lists?

Correct Answer for the Question – Which two statements apply to dynamic access lists? is given below Which two statements apply to dynamic access lists?(choose two) they offer simpler management in large internetworks. you can control logging messages. they allow packets to be filtered based on upper-layer session information. you can set a time-based security policy. … Read more

Which two commands show that there is a native VLAN mismatch on that link?

Correct Answer for the Question – Which two commands show that there is a native VLAN mismatch on that link? is given below Two switches are connected through a trunk link. Which two commands show that there is a native VLAN mismatch on that link? (Choose two) show interfaces interface switchport show interface interface trunk show … Read more

What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-topoint WAN links?

Correct Answer for the Question – What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-topoint WAN links? is given below What are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of … Read more

Which of the following statements are true regarding bridges and switches?

Correct Answer for the Question – Which of the following statements are true regarding bridges and switches? is given below Which of the following statements are true regarding bridges and switches? (Choose 3.) Switches are primarily software based while bridges are hardware based. Both bridges and switches forward Layer 2 broadcasts. Bridges are frequently faster than … Read more

Which one can create a secure terminal connection to a remote network device?

Correct Answer for the Question – Which one can create a secure terminal connection to a remote network device? is given below Refer to the following protocols, which one can create a secure terminal connection to a remote network device? ARP SSH Telnet wep SNMPv1 SNMPv2 Correct Answer The Correct Answer for this Question is SSH … Read more