Which type of wireless encryption is used for WPA2 in preshared key mode?
Which type of wireless encryption is used for WPA2 in preshared key mode?A . TKIP with RC4B . RC4C . AES-128D . AES-256View AnswerAnswer: D Explanation: We can see in this picture we have to type 64 hexadecimal characters (256 bit) for the WPA2 passphrase so we can deduce the...
Which action must be taken in router R1 to help resolve the configuration issue?
Refer to Exhibit. Router R1 Fa0/0 is unable to ping router R3 Fa0'1. Which action must be taken in router R1 to help resolve the configuration issue?A . set the default network as 20.20.20.0/24B . set the default gateway as 20.20.20.2C . configure a static route with Fa0/1 as the...
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)
What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two)A . The DHCP server offers the ability to exclude specific IP addresses from a pool of IP addressesB . The DHCP client can request up to four DNS server addressesC . The DHCP server assigns IP addresses...
What is a benefit of using a Cisco Wireless LAN Controller?
What is a benefit of using a Cisco Wireless LAN Controller?A . Central AP management requires more complex configurationsB . Unique SSIDs cannot use the same authentication methodC . It supports autonomous and lightweight APsD . It eliminates the need to configure each access point individuallyView AnswerAnswer: D
Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right
DRAG DROP Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. View AnswerAnswer: Explanation: Double-Tagging attack: In this attack, the attacking computer generates frames with two 802.1Q tags. The first tag matches the native VLAN of the trunk...
Which command sequence must be configure on R2 to Be elected as the DR in the network?
Refer to Exhibit. All routers in the network are configured R2 must be the DR. After the engineer connected the devices, R1 was elected as the DR. Which command sequence must be configure on R2 to Be elected as the DR in the network? A . Option AB . Option...
Drag and drop the descriptions of file-transfer protocols from the left onto the correct protocols on the right
DRAG DROP Drag and drop the descriptions of file-transfer protocols from the left onto the correct protocols on the right. View AnswerAnswer:
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.
Which attribute does a router use to select the best path when two or more different routes to the same destination exist from two different routing protocols.A . dual algorithmB . metricC . administrative distanceD . hop countView AnswerAnswer: C Explanation: Administrative distance is the feature used by routers to...
How does the router manage traffic to 192.168.12.16?
Refer to the exhibit. How does the router manage traffic to 192.168.12.16?A . It selects the RIP route because it has the longest prefix inclusive of the destination address.B . It chooses the OSPF route because it has the longest prefix inclusive of the destination address.C . it load-balances traffic...
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?
Which command prevents passwords from being stored in the configuration as plain text on a router or switch?A . enable secretB . service password-encryptionC . username Cisco password encryptD . enable passwordView AnswerAnswer: B