Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
What is the effect of this configuration?
Refer to the exhibit. What is the effect of this configuration?A . All ARP packets are dropped by the switch.B . Egress traffic is passed only if the destination is a DHCP server.C . All ingress and egress traffic is dropped because the interface is untrusted.D . The switch discard...
Which route does R1 select for traffic that is destined to 192 168.16.2?
Refer to the exhibit. Which route does R1 select for traffic that is destined to 192 168.16.2?A . 192.168.16.0/21B . 192.168.16.0/24C . 192.168 26.0/26D . 192.168.16.0/27View AnswerAnswer: D Explanation: The destination IP addresses match all four entries in the routing table but the 192.168.16.0/27 has the longest prefix so it...
When OSPF learns multiple paths to a network, how does it select a route?
When OSPF learns multiple paths to a network, how does it select a route?A . It multiple the active K value by 256 to calculate the route with the lowest metric.B . For each existing interface, it adds the metric from the source router to the destination to calculate the...
Which set of action satisfy the requirement for multi-factor authentication?
Which set of action satisfy the requirement for multi-factor authentication?A . The user swipes a key fob, then clicks through an email link.B . The user enters a user name and password, and then clicks a notification in an authentication app on a mobile device.C . The user enters a...
Which configuration when applied to switch A accomplishes this task?
Refer to the exhibit. Which configuration when applied to switch A accomplishes this task? A network engineer must block access for all computers on VLAN 20 to the web server via HTTP. All other computers must be able to access the web server. Which configuration when applied to switch A...
Which password must an engineer use to enter the enable mode?
Refer to the exhibit. Which password must an engineer use to enter the enable mode?A . adminadmin123B . defaultC . testing1234D . cisco123View AnswerAnswer: C Explanation: If neither the enable password command nor the enable secret command is configured, and if there is a line password configured for the console,...
Which two steps will fulfill the request?
An engineer is asked to protect unused ports that are configured in the default VLAN on a switch. Which two steps will fulfill the request? (Choose two)A . Configure the ports in an EtherChannel.B . Administratively shut down the ports.C . Configure the port type as access and place in...
What is the primary different between AAA authentication and authorization?
What is the primary different between AAA authentication and authorization?A . Authentication verifies a username and password, and authorization handles the communication between the authentication agent and the user database.B . Authentication identifies a user who is attempting to access a system, and authorization validates the users password.C . Authentication...