Which command must be configured to increment the security-violation count and forward an SNMP trap?
A port security violation has occurred on a switch port due to the maximum MAC address count being exceeded. Which command must be configured to increment the security-violation count and forward an SNMP trap?A . switchport port-security violation access B. switchport port-security violation protect C. switchport port-security violation restrict D....
What occurs when overlapping Wi-Fi channels are implemented?
What occurs when overlapping Wi-Fi channels are implemented?A . The wireless network becomes vulnerable to unauthorized access. B. Wireless devices are unable to distinguish between different SSIDs C. Users experience poor wireless network performance. D. Network communications are open to eavesdropping.View AnswerAnswer: C
If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?
Refer to the exhibit. If OSPF is running on this network, how does Router 2 handle traffic from Site B to 10.10.13/25 at Site A?A . It sends packets out of interface Fa0/2 only. B. It sends packets out of interface Fa0/1 only. C. It cannot send packets to 10.10.13...
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?
Which spanning-tree enhancement avoids the learning and listening states and immediately places ports in the forwarding state?A . BPDUfilter B. PortFast C. Backbonefast D. BPDUguardView AnswerAnswer: B Explanation: PortFast Spanning Tree Portfast causes layer 2 switch interfaces to enter forwarding state immediately, bypassing the listening and learning states. It should...
What causes a port to be placed in the err-disabled state?
What causes a port to be placed in the err-disabled state?A . latency B. port security violation C. shutdown command issued on the port D. nothing plugged into the portView AnswerAnswer: B Explanation: This mode is the default violation mode; when in this mode, the switch will automatically force the...
Which outcome is expected when PC_A sends data to PC_B?
Refer to the exhibit. Which outcome is expected when PC_A sends data to PC_B?A . The switch rewrites the source and destination MAC addresses with its own. B. The source MAC address is changed. C. The source and destination MAC addresses remain the same. D. The destination MAC address is...
Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?
Which security program element involves installing badge readers on data-center doors to allow workers to enter and exit based on their job roles?A . role-based access control B. biometrics C. multifactor authentication D. physical access controlView AnswerAnswer: D
Which switch becomes the root of the spanning tree for VLAN 110?
Refer to the exhibit. Which switch becomes the root of the spanning tree for VLAN 110? Switch 1 VLAN 110 C 32778 0018.184e.3c00 Switch 2 VLAN 110 C 24586 001a.e3ff.a680 Switch 3 VLAN 110 C 28682 0022.55cf.cc00 Switch 4 VLAN 110 C 64000 0e38.7363.657fA . Switch 1 B. Switch 2...
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right
DRAG DROP Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. View AnswerAnswer: Explanation: Double-Tagging attack: In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk...
What is a DHCP client?
What is a DHCP client?A . a host that is configured to request an IP address automatically B. a server that dynamically assigns IP addresses to hosts C. a workstation that requests a domain name associated with its IP address D. a rooter that statically assigns IP addresses to hostsView...