How are VLAN hopping attacks mitigated?

How are VLAN hopping attacks mitigated?A . manually implement trunk ports and disable DTPB . configure extended VLANsC . activate all ports and place in the default VLAND . enable dynamic ARP inspectionView AnswerAnswer: A

September 13, 2021 No Comments READ MORE +

What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two)

What are two similarities between UTP Cat 5e and Cat 6a cabling? (Choose two)A . Both support runs of up to 100 meters.B . Both support runs of up to 55 meters.C . Both operate at a frequency of 500 MHz.D . Both support speeds of at least 1 Gigabit.E...

September 13, 2021 No Comments READ MORE +

What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two)

What are two characteristics of the distribution layer in a three-tier network architecture? (Choose two)A . provides a boundary between Layer 2 and Layer 3 communicationsB . designed to meet continuous, redundant uptime requirementsC . serves as the network aggregation pointD . physical connection point for a LAN printerE ....

September 13, 2021 No Comments READ MORE +

What is the path for traffic sent from one user workstation to another workstation on a separate switch in a three-layer architecture model?

What is the path for traffic sent from one user workstation to another workstation on a separate switch in a three-layer architecture model?A . access C core C distribution C accessB . access C distribution C distribution C accessC . access C core C accessD . access -distribution C core...

September 13, 2021 No Comments READ MORE +

Which action does the router take as it forwards a packet through the network?

Which action does the router take as it forwards a packet through the network?A . The router replaces the original source and destination MAC addresses with the sending router MAC address as the source and neighbor MAC address as the destinationB . The router replaces the source and destination labels...

September 13, 2021 No Comments READ MORE +

What is the cause of the intermittent connectivity issue?

Refer to the exhibit. Shortly after SiteA was connected to SiteB over a new single-mode fiber path, users at SiteA report intermittent connectivity issues with applications hosted at SiteB. What is the cause of the intermittent connectivity issue?A . Interface errors are incrementingB . An incorrect SFP media type was...

September 13, 2021 No Comments READ MORE +

Which command must be issued on the interface?

A network engineer must configure the router R1 GigabitEthernet1/1 interface to connect to the router R2 GigabitEthernet1/1 interface. For the configuration to be applied the engineer must compress the address 2001:0db8:0000:0000:0500:000a:400F:583B. Which command must be issued on the interface?A . ipv6 address 2001:db8::500:a:400F:583BB . ipv6 address 2001 db8:0::500:a:4F:583BC . ipv6...

September 12, 2021 No Comments READ MORE +

Which networking function occurs on the data plane?

Which networking function occurs on the data plane?A . facilitates spanning-tree electionsB . processing inbound SSH management trafficC . forwarding remote client/server trafficD . sending and receiving OSPF Hello packetsView AnswerAnswer: C

September 12, 2021 No Comments READ MORE +

What is a syslog facility?

What is a syslog facility?A . host that is configured for the system to send log messagesB . password that authenticates a Network Management System to receive log messagesC . group of log messages associated with the configured severity levelD . set of values that represent the processes that can...

September 12, 2021 1 Comment READ MORE +

Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?

An administrator must secure the WLC from receiving spoofed association requests. Which steps must be taken to configure the WLC to restrict the requests and force the user to wait 10 ms to retry an association request?A . Enable Security Association Teardown Protection and set the SA Query timeout to...

September 12, 2021 No Comments READ MORE +