What is the role of a firewall in an enterprise network?

What is the role of a firewall in an enterprise network?A . determines which packets are allowed to cross from unsecured to secured networksB . processes unauthorized packets and allows passage to less secure segments of the networkC . forwards packets based on stateless packet inspectionD . explicitly denies all...

September 9, 2021 No Comments READ MORE +

Drag and drop the statement about networking from the left into the corresponding networking types on the right. Not all statements are used.

Drag and drop the statement about networking from the left into the corresponding networking types on the right. Not all statements are used. View AnswerAnswer:

September 9, 2021 No Comments READ MORE +

What is the difference in data transmission delivery and reliability between TCP and UDP?

What is the difference in data transmission delivery and reliability between TCP and UDP?A . UDP sets up a connection between both devices before transmitting data. TCP uses the three-way handshake to transmit data with a reliable connection.B . TCP transmits data at a higher rate and ensures packet delivery....

September 9, 2021 No Comments READ MORE +

Which type of security program is in place?

An email user has been lured into clicking a link in an email sent by their company’s security organization. The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?A . Physical access controlB . Social...

April 13, 2021 No Comments READ MORE +

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)

Which two actions are performed by the Weighted Random Early Detection mechanism? (Choose two)A . It drops lower-priority packets before it drops higher-priority packetsB . It can identify different flows with a high level of granularityC . It guarantees the delivery of high-priority packetsD . It can mitigate congestion by...

April 12, 2021 No Comments READ MORE +

Which statement correctly compares traditional networks and controller-based networks?

Which statement correctly compares traditional networks and controller-based networks?A . Only traditional networks offer a centralized control planeB . Only traditional networks natively support centralized managementC . Traditional and controller-based networks abstract policies from device configurationsD . Only controller-based networks decouple the control plane and the data planeView AnswerAnswer: D...

April 12, 2021 No Comments READ MORE +

Which command provides this output?

Refer to the exhibit. Which command provides this output?A . show ip routeB . show ip interfaceC . show interfaceD . show cdp neighborView AnswerAnswer: D

April 12, 2021 No Comments READ MORE +

How do TCP and UDP differ in the way that they establish a connection between two endpoints?

How do TCP and UDP differ in the way that they establish a connection between two endpoints?A . TCP uses synchronization packets, and UDP uses acknowledgment packetsB . UDP uses SYN, SYN ACK and FIN bits in the frame header while TCP uses SYN, SYN ACK and ACK bitsC ....

April 12, 2021 No Comments READ MORE +

Which configuration is needed to generate an RSA key for SSH on a router?

Which configuration is needed to generate an RSA key for SSH on a router?A . Configure the version of SSHB . Configure VTY accessC . Create a user with a passwordD . Assign a DNS domain nameView AnswerAnswer: D Explanation: In order to generate an RSA key for SSH, we...

April 12, 2021 No Comments READ MORE +

Which password must an engineer use to enter the enable mode?

Refer to the exhibit. Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console,...

April 12, 2021 No Comments READ MORE +