1.
Which statement describes a best practice when configuring trunking on a switch port?
2.
Which type of Layer 2 attack causes a switch to flood all incoming traffic to all ports?
3.
What is the best way to prevent a VLAN hopping attack?
4.
Which statement about PVLAN Edge is true?
5.
If you are implementing VLAN trunking, which additional configuration parameter should be added to the trunking configuration?

 
6.
Which option is a key difference between Cisco IOS interface ACL configurations and Cisco ASA appliance interface ACL configurations?
7.
On Cisco ISR routers, for what purpose is the realm-cisco.pub public encryption key used?
8.
Which four tasks are required when you configure Cisco IOS IPS using the Cisco Configuration Professional IPS wizard? (Choose four.)
9.
Which statement is a benefit of using Cisco IOS IPS?
10.
Which description of the Diffie-Hellman protocol is true?