1.
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three)
2.
When should you run multiple protocols?
3.
How can you mitigate threats in WLANS when static WEP keys are used?
4.
Which of these is a benefit of an integrated security management system?
5.
What should you keep in mind when using a firewall to secure traffic?
6.
What is used to dynamically create a pair or multiple pairs of sources addresses?
7.
What is a characteristic of a classful network environment?
8.
What should you keep in mind when using a midspan PSE?
9.
Which statement concerning the Active/Active failover feature is correct?
10.
How does the Cisco Small Business Pro Service differ from the Cisco Small Business Pro Warranty?