1.
When using Cisco Router and Security Device Manager to configure AAA login authentication policies, which four methods are available? (Choose four.)
2.
You have just configured HSRP and need to determine which router is active. Which command should you enter?
3.
A North American customer is using 2.4-GHz radios in a point-to-point configuration. The radio power level is 17 dBm and is transmitting at 11 Mbps. The customer is using 21.5-dBi dish antennas and 50 feet of cabling, with a loss of 8.4 dB per 100 feet. The customer increased the distance between the transmitter stations and began experiencing link problems. Without using a professional installer, which step should the customer take to fix the situation?
4.
Which command assigns a cost value of "17" to a switch port?
5.
You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted interface. You suspect that the rule may be blocking necessary traffic onto the network. What must you do to delete that rule when using Cisco Router and Security Device Manager?
6.
A customer in Europe needs to establish an 11-Mbps wireless bridge link between two office buildings that are approximately 1.3 km apart. The wireless link will pass through a public park, which contains a lake that is surrounded by trees. You run the range calculation and determine that the Cisco Aironet 1300 Series Outdoor Access Point/Bridge should work. You install the link using 10.5-dB yagis with 75 feet of standard Cisco cabling and both radios set at 20 mW. The wireless bridges are not able to establish or maintain a link. What is needed to successfully complete this link?
7.
You connect via Telnet to a Cisco access point and enter the command show dot11 linktest. Which output might you obtain?
8.
In what location is it recommended that the Cisco Catalyst 6500 Series WLSM be placed?
9.
After configuring VTP, you no longer receive updates as expected. Which command can you use to verify the number of VTP advertisements being transmitted?
10.
The customer wants to implement wireless security through implementation of WPAv2. Which component of WPAv2 would limit the rollout because of the continued use of old access points?