IT Questions Bank A WIC-1T module needs to be installed in a Cisco 1841 router that currently has a WIC-2T module in slot 0. What should the network technician do first?ITExamAnswers asked 7 months ago • CCNA Discovery v4When implementing a security policy, which two actions should be included as part of the security checklist? (Choose two.)ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. Access list 100 is applied inbound to interface serial 0/0/0 on the SOHO Router1. Which traffic will be denied by the configuration?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. Following a test plan, the network systems engineer completes the configuration of an access layer switch and connects three PCs. The engineer attempts to ping from each PC to the other connected PCs to test the configuration. Which statement describes the result of the last step?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which technology will prioritize traffic based upon the technical requirements of IP telephony?ITExamAnswers asked 7 months ago • CCNA Discovery v4A network engineer is prototyping a new IP addressing and summarization strategy for a new network that will be integrated into the existing infrastructure. Which method is appropriate for testing the addressing scheme?ITExamAnswers asked 7 months ago • CCNA Discovery v4A company decides to deploy a virtual private network (VPN) to connect remote workers and branch offices to corporate headquarters. What is the best description of the type of connectivity the company is ready to implement?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. An administrator installs a WIC-2T module into a Cisco 1841 router. Attempts to configure the S0/0/0 interface are unsuccessful. As a first step in troubleshooting the failure, the administrator issues the show version command. What is a possible reason for the failure?ITExamAnswers asked 7 months ago • CCNA Discovery v4What type of Frame Relay subinterface must be used to connect remote sites without having to disable split horizon?ITExamAnswers asked 7 months ago • CCNA Discovery v4Which statement is true about the pairing of services and transport layer protocols for FTP and VoIP?ITExamAnswers asked 7 months ago • CCNA Discovery v4A company is concerned with protecting internal e-commerce servers against external attacks. An application layer firewall is installed at the network edge and a host-based IDS system is installed on the internal LAN. What should be done to ensure a fast response and minimum server downtime in the event of an external attack?ITExamAnswers asked 7 months ago • CCNA Discovery v4A technician adds the command Router(config-router)# variance 5 to a router using EIGRP as the routing protocol. What is the result of entering this command?ITExamAnswers asked 7 months ago • CCNA Discovery v4A small bookstore would like to offer wireless connectivity for customers with laptops. Which wireless components or devices will provide connectivity to the Internet for the customers with the least possible cost to the bookstore?ITExamAnswers asked 7 months ago • CCNA Discovery v4While configuring a router with EIGRP, a technician enters the EIGRP command: Router(config-router)# variance 3 What is the effect of entering this command?ITExamAnswers asked 7 months ago • CCNA Discovery v4Refer to the exhibit. What happens if the network administrator issues the commands shown when an ACL called Managers already exists on the router?ITExamAnswers asked 7 months ago • CCNA Discovery v4