1.
What strategy will protect network resources and services from unauthorized actions?
2.
What is an attack that occurs when a string of unnecessary commands or requests is sent to a network device?
3.
A company is interested in using IP telephony to save money on phone communications. What must be in place before an IP telephony solution can be implemented?
4.
What creates an encrypted tunnel through a shared public network infrastructure, such as the Internet, to provide a secure connection between remote users and a private network?
5.
What ensures that voice packets are given priority throughout the network so that conversations arrive intact?
6.
Which device is used in wireless networks to send transmissions to a target area?
7.
Which interoperability standard provides a maximum speed on a wireless local-area network (WLAN) of 11 megabits per second?
8.
A global manufacturer of automobile parts wants to implement specialized voice applications to increase productivity and reduce the cost of overseas toll calls. Which Cisco solution best matches this business need?
9.
On what type of network does the Cisco Unified Communication system reside?
10.
Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?