www.TestsNow.com Q: 7 Which two of these commands are required to implement a Cisco Catalyst 6500 Series Firewall Services Module (FWSM) in a Catalyst 6500 running Cisco IOS? (Choose two.)
A. firewall multiple-vlan-interfaces B. firewall module vlan-group y C. module secure-traffic D. firewall vlan-group <vlan-x> E. firewall module secure-traffic
Answer: B, D www.TestsNow.com Q: 8 Routing loops can occur in distance vector routing protocols if the network has inconsistent routing entries. Which three of these methods can be used to avoid them? (Choose three.)
A. split horizon B. route poisoning C. route suppression D. route splitting E. hold-down timers
Answer: A, B, E www.TestsNow.com Q: 9 A bogon list (a list of reserved or unassigned IP addresses) that is applied to an access control list (ACL) can be best described as which of these? Leading the way in IT testing and certification tools, www.TestsNow.com
-6-