1.
Unicast Reverse Path Forwarding can perform all of these actions except which one?
2.
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How should you solve this issue and prevent it from happening in the future?
3.
Why would a rogue host that is running a DHCP server on a campus LAN network present a security risk?
4.
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?
5.
If you have overlapping IP address between two different networks or routing domains, which two commands are needed to globally configure NAT to get this to work?
6.
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?
7.
If a certificate authority trustpoint is not configured when enabling HTTPS and the remote HTTPS server requires client authentication, connections to the secure HTTP client will fail. Which command must be enabled for correct operation?
8.
For the following protocols, which one provides a mechanism to transparently intercept and redirect CIFS traffic from a client to a local Cisco Wide Area Application engine?
9.
What is a characteristic of Network Time Protocol?
10.
In GLBP, which router will answer on client ARP requests?