NO.1 What is the major difference between TACACS+ and RADIUS?
A. TACACS+ runs in TCP ,RADIUS operates in UDP
B. TACACS+ runs in UDP ,RADIUS operates in TCP
C. RADIUS encrypts the entire body of the access-request packet that is sent from the client to the
server,TACACS+ encrypts only the password in the access-request packet
D. TACACS+ and RADIUS operate on two different protocol layers
Answer: A
NO.2 In which of these phases is a customer's current network infrastructure assessed?
A. Plan
B. Design
C. Implement
D. Prepare
Answer: A
NO.3 After configuring VTP , you no longer receive updates as expected. Which command can you
use
to verify the number of VTP advertisements being transmitted?
A. show vtp database
B. show vtp counters
C. show vtp statistics
D. show vtp status
Answer: B
NO.4 What are two configurable options for Call Control on the Cisco UC520? (Choose two.)
A. Shared Key
B. PBX
C. Key System
D. Encryption
E. Call Waiting
Answer: B,C
NO.5 Which two statement best describe the wireless core feature set using autonomous access
points
when implementing Wireless Domain Services? (Choose two)
A. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or a
Cisco Integrated Services Router
B. Layer 2 services can be configured in a Cisco Aironet autonomous AP or a Cisco
Integrated Services Router
C. Layer 2 and Layer 3 services can be configured in a Cisco Aironet autonomous AP or
controllers
D. Layer 3 services can be configured in WLSM
E. Layer 3 services can be configured in WLSE
Answer: B,D
NO.6 A user is unable to connect to the Cisco Router and Security Device Manager via HTTPS. Which
two of these might have caused this problem? (Choose two.)
A. The ip https server command is missing from the running configuration.
B. The ip httpsecure servercommand is missing from the running configuration
C. The user is trying to launch Cisco Router and Security Device Manager from the inside
(secured) interface with a firewall enabled.
D. The user has a privilege level lower than 15.
E. The browser security level is set too high.
Answer: B,D
NO.7 What does understanding the radiation patterns of different antennas types help you to
determine
when providing wireless coverage in an office building?
A. the exact number of access points that are needed
B. the type of antenna to cover a specific area
C. the size of an area that will be covered
D. the location of the access points
Answer: B
NO.8 An 802.11 b telephone is receiving an audio signal from an access point, but cannot send
audio.
What is a possible cause?
A. the RSSI value on the telephone is greater than 35.
B. The access point is set to receive only at 802.11g data rates.
C. The security settings in the telephone do not match the settings in the access point.
D. The transmit power in the telephone is significantly lower than the transmit power in the access
point.
Answer: D
NO.9 You have configured and applied a Cisco IOS Firewall access rule to the inbound, untrusted
interface. You suspect that the rule may be blocking necessary traffic onto the network. What must
you do to delete that rule when using Cisco Router and Security Device Manager?
A. Select ACL Editor > Access Rules to delete the rule.
B. You must remove the association between the rule and the interface before deleting the rule
C. You must delete the associated access list on the interface,then reconfigure the access list as
required,and then reapply the access group to the proper interface.
D. Go to the Edit Firewall Policy tab to delete the rule.
Answer: B
NO.10 How many voice expansion slots are provided by the Cisco UC520?
A. One
B. two
C. three
D. four
Answer: A