On a multilayer switch, in which table is the QoS information retained?
A. CAM
B. MAC
C. Routing
D. TCAM
For which kind of attack does an attacker use known information in encrypted files to break the encryption scheme for the rest of ciphertext?
A. Known-plaintext
B. Known-ciphertext
C. Unknown key
D. Man in the middle
Which one of the following types of routing protocol is OSPF?
A. advanced distance vector
B. link state
C. distance vector
D. path vector
Which is the best routing protocol to use on the Internet to route between autonomous systems?
A. RIP
B. EGP
C. IS-IS
D. BGP
In which one of the following layers of the OSI model does the router primarily operate?
A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 7
What is used by a router to make traffic forwarding decisions at Layer 3?
A. MAC address table
B. routing table
C. DSCP mutation table
D. QoS information in the TCAM
Which three of the following statements are true regarding the router? (Choose three.)
A. Longer prefixes are always preferred over shorter ones when forwarding a packet.
B. Routers use administrative distance to determine the trustworthiness of the routes
C. Routers use routing tables to route between networks.
D. Routers populate the routing table by dynamically learning the source IP address of incoming packets
E. Routers are considered Layer 2 devices.
Which one of the following statements is true regarding the CAPWAP tunneling protocol?
A. It is used to encapsulate data between the LWAP and the WLC.
B. It is used to encapsulate data between different standalone APs.
C. It is used to encapsulate data between the standalone AP and the wireless clients.
D. It is used to encapsulate data between the LWAP and the wireless clients.
Which two of the following statements are true regarding standalone and lightweight access points? (Choose two.)
A. Lightweight access points are self-contained, each offering one or more fully functional BSSs.
B. Standalone access points can be configured one-by-one and offer complete functionality by themselves.
C. Lightweight access points rely on a central wireless LAN controller to retrieve their configurations.
D. Lightweight access points are also known as autonomous access points.
Which one of the following statements is true regarding STP?
A. STP is used to defend against spoofing attacks
B. STP is used to maintain the VLAN configuration consistency across the Layer 2 network.
C. STP is used to prevent loops from being formed when switches or bridges are interconnected via multiple paths across the Layer 2 network.
D. STP is used to negotiate whether an interconnection between two switches should be put into access or trunk mode.
E. STP is used to detect the loss of bidirectional communication on a link.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Cisco exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 210-250 exam preparations and Cisco certification application, do not hesitate to visit our Vcedump.com to find your solutions here.