0% found this document useful (0 votes)
98 views20 pages

200-301 Update 30 08

hola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
98 views20 pages

200-301 Update 30 08

hola
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
Which command must be entered when a device is configured as an NTP server? A. ntp peer C. ntp authenticate D. ntp server Refer to the exhibit. What two conclusions should be made atout this configuration? (Choose two.) SW1#show spanning-tree vian 30 VLANO030 Spanning tree enabled protocol rstp Root ID Priority 32798 Address 0025.63e9.c800 Cost 19 Port 4 (FastEthernet 2/1) Hello Time 2sec Max Age 30sec Forward Delay 20 sec [Output suppressed] B. The designated port is FastEthemet 2/1 ©. The spanning:tree mode is PVST+ D. This is a root bridge A network engineer must create 2 diagram cf a muttivendor network. Which command must be configured on the Cisco devices so that the topology of the network can be mapped? B. Davice(configitedp run C. Davicecontg-fizcdp enable D. Device(config)#iow-sampler-map topology Which function does an SNMP agent perform? B. It manages routing between Layer 3 devices in a network C. It coordinates user authentication between a network device and a TACACS+ or RADIUS server D. It requests information from remote network nodes about catastrophic system events What are two differences between opticalsiber cabling and copper cabling? (Choose two.) ‘A. ABNC connector is used for fber connections The glass core component is encased in a cladding The data can pass through the cladding Light is transmitted through the core of the fiber Fiber connects to physical interfaces using RJ-45 connections moog focused on network ‘Controller-Based Networking focused on network focused on devices user input is a policy user input is a configuration —— uses white list security model user input is a policy | | [Traditional Networking uses white list security model focused on devices uses black list security model user input is a configuration uses black list security model Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open standard protocol? (Choose two.) A. interface GigabitEthemet0/0/ channel-group 10 mode auto B. interface GigabitEthernet0/0/1 channel-group 10 mode on C. interface port-channel 10 no switchport ip address 172.16.0.1 255.266.265.0 D. interface GigabitEthernet0/0/1 channel-group 10 mode active interface port-channel 10 switchport switchport mode trunk configure 802.1x authenticate configure DHCP snooping configure the native VLAN with @ nondefault VLAN ID disable DTP ‘What occurs to frames during the process of frame flooding? A. Frames are sent all ports, including those that are assigned to other VLANS. B. Frames are sent to every port on the switch that has a matching entry in MAG address table D. Frames are sent to every port on the switchin the same VLAN, (10.10.12.0730] 79,10.17.0730 Router 2 Router 3 Router 4 Routert#show ip route Gateway of last resort is 10.10.11.2 to network 0.0.0.0 209,165,200.0/27 is subnetted, 1 subnets 8 209.165.200.224 [2010] via 10.10.12.2, 03:22:14 209.165,201.0127 is subnetted, 1 subnets 8 209.165.201.0 [20/0] via 10.10.12.2, 02:26:33 209.165.202.027 Is subnetted, 1 subnets 8 209.165.202.128 [20/0] via 10.10.12.2, 02:26:03 10.0.0.0/8 is variably subneted, 10 subnets, 4 masks ° 10.10.13.0/25 [11072] via 10.10.10.1, 00:00:04, Gigabitéthernet0/O ° 10.10.13.128/28 [110/2] via 10.10.10.5, 00:00:12, Gigabitethemet0/1 ° 10.10.13.144/28 [1102] via 10.10.10.9, 00:01:57, Gigabitethernet0/2 ° 10.10.13.160/29 [110/2] via 10.10.10.5, 00:00:12, Gigabitethemet0/1 ° 10,10.13.208/29 [110/2] via 10.10.10.13, 00:01:57, Gigabitethernet0/3 S* 0,0,0.0/0 [1/0] via 10.10.41.2 Foferto thee To which deice des Root send packats at are sine host 1040181862 A. Roo ‘What aro two fundamentals cf vituaizaton® (Choose two.) ©. ttallows ¢ physical router to directly connect NICs from each virtual machine into the network. 1D. requires that some servers, vitual machines, and network gear reside on the Intanet. The environment must be configured with one hypervisor that serves solely as 3 network manager to montor SNMP tac. What benefttdoes controller-based networking provide versus traditicnal networking? B. provides an added layer of security to protect rom DDoS attacks C. combines contro! and dats plane functionality on a single device to minimize latency 1D. moves irom a twotierto a three-tier network architecture to provide maximum redundancy 10.10.225.0/28, 10.10.225, 16/28 10.10.225,64/26 Refer fo the exhibit An engineer must acd. subnatfor a new office that will add-20 users tothe network. winch iFvé network ang suonet mas« combination does the engneer assign to minimize wastng addresses? A. 10.10.228.48 286.258.255.240 1B. 10-10.295 39 258 255.285 240 ©. 10:10.225.48 255.255.255.204 What event has occurred ifa router sends a nctice level message to a syslog server? AL Aceriicate has expired C. ATCP connection has been torn down D. AnICMP connection has been built Reterto he emia. ne network onvronmentiseperatng normal whieh hips ct eves must bs connected InttacaFastemomnat ar? ip arp inspection vian 2-10 interface fastetheret 0/1 ip arp inspection trust ‘A DHCP client 8 access point ©. router How does Cisco DNA Center gather data from the network? A. Devices use te cal-tiome protocol to pertocicaly send data to me controler B. Devices establish an IPsectunnel to exchange data with the controler ©. The Cisco CLI Analyzertool gathers data from each licensed network davice and streams itto the controller Which configuration issue is preventing the OSPF neighbor from being established between the two routers? i210 R1#show running-config Building configuration... ! interface GigabitEthernet1/0 mtu 1600 ip address 192.168.0.1 255.255.255.252 negotiation auto ! router ospf 1 router-id 1.1.1.1 passive-interface default No passive-interface GigabitEthernet1/0 network 192.168.0.1 0.0.0.0 area 0 ! R2#show running-config Building configuration... ! interface Gigabitethernet2/0 ip address 192.168.0.2 255.255.255.252 negotiation auto ! router ospf 1 router-id 2.2.2.2 passive-interface default No passive-interface GigabitEthernet2/0 network 192.168.0.2 0.0.0.0 areaO A. R1 hes anincorrect network command for interface Gi1/0. 8. R2 shouldhave its network commandin area 1 D. R2isusing the passive-interface default command. Refer to the extuot An administrator is tasked win conaguring a voice VLAN. What isthe expected outcome when 2 Cisco phone is connected tothe Gigabitthemet 2/14 port on a swith? interface GigabitEthernet3/1/4 switchport voice vlan 50 ! A. The phone and a workstation thats connected io the phone do noi have VLAN connectivity CC. The phone sends and receivas dats in VLAN 50, outa workstation connected the phone has ne VLAN connected. 1D. The phone anc a workstation hats connected he phone send and receve data in VLAN 50. Apacketis destined for 10.10.1.22. Which static route does the router choose to forward the packet? A. iproute 10.10.1.0 255.255.255.240 10.10.255.1 C. ip route 10.10.1.16 255.255.255.252 10.10.255.1 1D. iproute 10.10.1.20 255.255.255.254 10.10.255.1 IBGP route 10.0.0.0/30 RIP route 10.0.0.0/30 OSPF route 10.0.0.0/16 OSPF route 10.0.0.0/30 EIGRP route 10.0.0.1/32 Refer tothe exhibit. A router recsived these five routes from diferent routing information sources. Which two routes does the router install in its routing table? (Choose two) A. OSPF route 10.00.0130 B. IBGP route 10.0.0.0/99 E. RIP route 10.0.0.0130 ‘The service password encryption commandis entered on a router. What isthe effect ofthis configuration? B._ prevents network administrators from configuring clear-lex passwords ©. protects the VLAN database from unauthorized PC connections on the switch D. enonpts the password exchange when a VPN tunnels establishee Rt Ss. —_sS..-_ —=S3 Fan Fam rar {at010.128 ror0x02706 202020.124 202020224 [eissnow pate NY “O86 NSA eeral pe 12 OSPF NEGA ocaraltpe 2 Eig, iS automa Ui TSISlever SIStv? 8008 Pr penode downloaded sae rae ‘DS EIGAP, €X- CGRP exeral 0. OSPF OSPF iter reo Fy “DSH Neatorama ype fh OSPF NGA vam type 2 E136 extemaiype | £2-OSPE eceral type? Fig Susie summa, fist eve LP eel la isis mtr ares, * veo defo U-peroer sn te 0DR, Pe pense soomiseded se rate cxcway otis reson not ot 1000024 sete. t sets le {00100 b arecty connected Fasteremeoo 2000024. subneted, | subnets 202020 0's erect conecied, Fasteheret01 rogaats subetie,tsurets 100100 marectycometed Faster R3#show ip route Codes: C - connected, S - static, R- RIP, M - mobile, B- BGP D- EIGRP, EX - EIGRP external, 0 - OSPF, IA- OSPF inter area Nt - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 Et - OSPF external type 1, E2 - OSPF external type 2 1-ISS, su -IS-IS summary, L1 - IS-IS level-1, L2 - ISS level-2 ia- ISS inter area, * - candidate default, U - per-user static route 0- DDR, P - periodic downloaded static route Gateway of last resort is not set 20.0.0.0/24 is subnettted, 1 subnets c 20.20.20.0is directly connected, FastEthernet0/1 10.0.0.0/24 is subnettted, 1 subnets s 10.10.10.0 (1/0) via 20.20.20.1 A. setthe default gateway as 20.2020.2 B._ configure a static route with Fa0/1 as the egress interface to reach the 20.20.2.0'24 network D. setthe default network as 20.20.20.0/24 What ere two reasons for an engineer to configure a floating staticrouts? (Choose two) B. to route traffic differently based on the source IP of the packet D. to supportload balancing va static routing E. to contol the return path oftrafic that is sent from the router 10.10.12.0730 VLAN 20 (Users) 10.10.11.0/30 10.10.13.0/24 Routerl#show ip route Gateway of last resort is 10.10.11.2 to network 0.0.0.0 209.165.200.0/27 is subnetted, 1 subnets 209.165.200.224 [20/0] via 10.10.12.2, 00:09:57 10.0.0,.0/8 is variably subnetted, 4 subnets, 2 masks 10.10.10.0/28 is directly connected, Gigabitethernet0/0 10.10.11.0/30 is directly connected, FastEthernet2/0 10-10.13.0/24 [110/2] via 10.10.10.1, 00:08:34, Gigabitethernet0/o 10.10.12.0/30 is directly connected, GigabitEthernet0/1 Switchifshow ip route Gateway of last resort is not set 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks c 10.10.10.0/28 is directly connected, FastEthernet0/1 © 10.10.13.0/24 is directly connected, VLAN20 eter tote exit when paths use ye otra ic? A oa. s06200027 0. 1010 0028 Which function does the range of private IPv4 addresses perform? B. provides 2 direct connection for hosts from outside of the enterprise network ©. ensures that NAT is notrequired to reach the Internet with private range addressing D. enables secure communications to the Intemetfor al external hosts EIGRP: 192.168.12.0/24 RIP: 192.168.12.0/27 OSPF: 192.168.12.0/28 Referto the exhibit. How does the router manage talfic te 192.188.12.167 A. Itchooses the EIGRP route because ithas the lowest administrative distance. B. Itload-batances traffic between all tree routes. D. Itselects the RIP route becauseit has the longest prefixincusive of the destnaton address. Which IFVé address block forwards packets to a multicast address rather than a unicast address? A 200033 B. FOOOT c. FE8O:/10 A corporate office uses four floors in a building. + Floor 1 has 24 users. + Floor 2 has 29 users. + Floor 3has 28 users. + Floor 4 has 22 users. Which subnet summarizes and gives the most efficient distibution of IP addresses for the router configuration? ‘A. 192.168.0.0/24 as summary and 192.168.0.0/28 for each floor B. 192.168.0.0/23 as summary and 192.168.0.0/25 for each floor D. 192.168.0.0/26 as summary and 192.168.0.0/29 for each floor Which action is expected rom SW/1 when the untagged treme is received cn the GigabitEthemeiOl1 interface? SW1#show run int gig 0/1 interface Gigabit=themet0/1 switchport access van 11 switchport trunk allowed vlan 1-10 switchport trunk encapsulation dottq switchport trunk native vlan 5 switchport mode trunk speed 1000 duplex full ‘A. The frame is processed in VLAN 1 B. The frame is processed in VLAN 11 D. Theframeis dropped Configured rosters IPv6 adresses “tanta 'Seral 000: 2012:1128, Uoopback': 2000-17128 ingen. ‘Seal 000: 2028:3/126, Loopback®: 2000.28 FReferto the exhibit. The loopback! interface of the Allanta router must reach the loopbacks interface ofthe Washington router. Wich two static host routes must be configured on the New Vorkrouter? (Choose two) |A. Ipv6 route 2000. 3/128 sO/o/0 8B. ipv6 routo 2000: 1/128 0l0/t 1D. ipv6 routo 2000: 1/128 2012:2 \Whatis ciference between RADIUS and TACACS#? ‘A RADIUS logs all commands inatate entered by the acministrator, out TACACS+ logs only start stop, and interim commands (©. TACACSr encnts only password information, and RADIUS encrpts he entre pavioad. D. RADIUS is most appropriate for dial authentication, but TACACS+ can bo used fr mute ypes of authontcation. Rt has leamed route 10.10.10.0/24 via numerous routing protecols. Which route is installed? ‘A. route with the next hop thathas the highestIP B. route with the lowest cost D. route with the shortest pref length ‘Which two minimum parameters must be enfigured on an sete inertaee to enable OSPFV2 0 operate? (Choose W/o) 1B OSPF MDS authentication key ©. OSPF stub lag D. FGedieess How does CAP WAP communicate between an access point|n local moce anda WLC? A. The access point must rot be connéctedto te wired nenwork, as WOUld create 3 loop B The access point must be connected o the same switch as the WLC ©. Tho access point must cirocty connoctte the WLC using a copper cablo What is the expected outcome when an EUL-64 address is generated? A. The interface ID is configured as a random 64-bit value B. The characters FE8O are inserted at the beginning of the MAC address of the interface D. The MAC address of the interface is useds the interface ID without modification ow do vasionalcamous deice management and Cis DNA Gente dees management oe in ecards to deoment? ‘A. Traalonal campus device management allows a newetko Scale move que an with Cisco DN Centar dadce management CC. Cisco DNA Center devce management can implemented al alowor cost han most radonal campus doves management ations. 1. ‘Taaonal campus dace management scrémes can peal dpioypatsies ancupdates mor quich han Cisco DMCs cence management Which purpose does 2 northbound API serve in a controller-oased networking architecture? B._ reports device errors to a controller C. generates statstics for network hardware and trafic, D. communicates between the controller andthe physical network hardware Routert Router2 Git Gilt Router1(config}#interface GigabitEthernet1/1 Routeri(config-if}#description ***Connection to Router2*** ip address 10.10.10.1 255.255.255.252 Routeri(config-if}#ip ospf£ hello-interval 5 Routeri(config}trouter ospf 1000 Router1(config-routerj#router-id 1.1.1.1 Router1(config-router}inetwork 10.10.10.0 0.0.0.3 area 0 Router2(config}#interface GigabitEthernet1/1 Router2(config-ifftdescription ***Connection to Router1*** Router2(config-if}#ip address 10.10.10.2 255.255.255.252 Router2(config}#router ospf 1001 Router2(config-routertrouter-id 2.2.2.2 Router2(config-router)tnetwork 10.10.10.0 0.0.0.3 area 0 Router2(config-router#passive-interface default Router2(config-router}éno passive-interface GigabitEthernet1/1 Refer to the exhibit After the confiauration is applied, the two routers fal to establish an OSPF neighbor relationship. Whatis the reason forthe problem? ‘A. The OSFF process IDs are mismatched 8 The natwork statement on Routert is misconfigured D. The OSPF router IDs are mismatched what isthe diference regarding reliabilty nd communication ype between TCP and UDP? ‘A. ToPisreiable andis a connecionless protocol, UDP is not relate ands @ connection-oriented protocol 1B TCP Isnotretable and is a connectionless protocol, UDP is reliable and is @ connecton-orlented protocol ©. TOP is netrolablo and is a connocton-crientod protocol; UDP is rliable andis a connectioniess protocol How do AAA operations compare regarding user identification, user services, and access control? ‘A. Authorzation provides access cortrol, and authentication tracks user senices C. Accounting tracks user senices, and authentication provides access control D. Authorization identifies users, and authentication provides access contra! \Wnich two commands were used to create port channel 102 (Choose two.) ‘Switch#show etherchannel summary [output omitted] Group Port-channel Protocol Ports enna nnn Po10(SU) Lace Gio/O(P) —_Gi0v1(P) Po20(SU) LAcP Giora(P)_Giav3(P) + “The ntworc administer wants VLAN 57 taficto he untagged between Swich 1 and Suiteh 2, whl all cther LANs areto remain tagged itn command acearnplishes his task? R1# show ip route 192.168.10.0/24 — [90/2679326] via 192.168.1.1 192.168.10.0/27 —[120/3] via 192.168.1.2 192.168.10.0/23 [110/2] via 192.168.1.3 192.168.10.0/13 [115/30] via 192.168.1.4 Refer to the exhibit How does router R1 handle trafic to 192.168.10.18? A. Itselects the IS-IS route because ithas the shortest prefi inclusive of the destination address, . Itselects the OSPF route because it has the lowest cost D. Itselects the EIGRP route because it has the lowestadministrative distance Gateway of last resort is 10.12.0.1 to network 0.0.0.0 O*E2 0.0.0.0/0 [110/1] via 10.12.0.1, 00:00:01, GigabitEthernet0/0 10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks 10.0.0.0/24 is directly connected, GigabitEthernet0/0 10.0.0.2/32 is directly connected, GigabitEthernet0/0 10.13.0.0/24 is directly connected, Gigabitethernet0/1 10.13.0.2/32 is directly connected, GigabitEthernet0/1 ‘A. allows cirecly connected neichbers to share configuration information 1B. trecuees routing failures by allowing Layer 3 Icad balancing between OSPF naightors thathave the same ink metric ©. Wallows ¢ router to use bridge priortes to create multiple loop-free palhs fo a single destination While examining excessive traffic on the network, itis noted that all incoming packets on an interface sppearto be allowed even though an Pv4 ACL Is applled fo the interface. Which two miscontigurations cause this behavior? (Choose Wo) A. TheACLis empty ©. “The packets tall to maten any permit statement D. Amatching deny statement is too hich in the access list Refer to the exhibit, Rovter R1 is running three different routing protocols. \yohion route characreristicIs Used bythe router to forvard the packet that treceWves for destination FP 172 19:32.17 R1# show ip route D 172.16.32.0/27 —_[90/2888597172] via 20.1.1.1 oO 172.16.32.0/19 [110/292094] via 20.1.1.10 R 172.16.32.0/24 [120/2] via 20.1.1.3 8 acminstratve aistance ©. cost D. metic 10-10 -10.1630 10.10.13.10/25 Rifsh ip ro Gateway of last resort is 1010.10.18 to network 0.0.0.0 10.0.0.0/8 is variably subnetted, 4 subnets, 3 masks 10.10.10.0/30 is directly connected, FastEthernet0/1 10.10.13.0/25 [110/6576] via 10.10.10.1, 06:58:21, Fastethernet0/1 10.10.10.16/30 is directly connected, FastEthernet0/24 10.10.13.144/28 [110/110] via 10.10.10.1, 06:58:21, FastEthernet0/1 ZOO] wis 10 TZ] on -eterto eevee ype onfguedto ese te tenet) A foaing staisrout ©. hosts ee) What is a characteristic of spine-and-leaf architecture? A. Each link between leaf switches allows forhigher bandwidth. B. Itprovides greater preaictabilly on STP blocked ports. CC. itprovides variable latency. What are two descriptions of three-tier network topologies? (Choose two) ©. The access layer manages routing between devices in diferent domeins D. The core layer maintains wired connections for each host E. The core and distribution layers perform the same functions What are two roles of the Dynamic Host Configuration Protocol (DHCP)? (Choose two) A. The DHOP sener assigns IP addresses without reauiring the client fo renew ther ©. Tho DHCP cliont can requost up to four DNS sewer addresses, The DHCP client maintains a pool of IP addresses it can assign. Whats a difference between local AP mode and FlexConnectAP mode? A” Local AP mode creates two CAPWAP tunnels per AP fo fhe WLC B. Local AP mode causes the AP to behave as ifit were an autonomous AP (©. FlexConnect AP mode falls to function ifthe AP loses connecivity with the WLC. \Which command prevents passwords from being storedin the configuralion as plain tex on a router or switch? A. enable secret 8. enable password D. username cisco password encrypt {By defaull, ow does EIGRP datermine he metic ofa route for he routing table? uses a default metic of 10 for al routes that are learned by the router. (©. Itcounts the numbor of hops betweon tho receving and destination routers and uses thatvaluo as the moti. DD. ltuses a reference banawiath ana ine actual banewien et he connected iinkto calcu‘ te route metIc. What is an advantage of Cisco DNA Center versus traditional campus device management? A. tis designed primarily to provide network assurance ©. Iteuppots high availability for management functions when operatingin clustor mods. D. Itenables easy autodiscovery of network elements in a brownfield deployment. afer te tit Anadis corigus four che fer local avanton using password that sone as 3 rptgapic hash, “Theterswihes musts supot SH acess lr adres io ange he newark nkasvucu® Vc wh ccantgue crac est ese recurements? SW/(configrine) sine vty 0.15 ‘SW3{ config) username admint secret abed 1234 ‘SW/(config-ine) #ne login local ‘SW3{config) #username admin? secret abed 1234 ‘SW/(contig-ine) #password cisco 'SW3{config-ine) sine vty 015 'SW3(config-ine) #login local ‘SW2(config) #username admint password abed 1234 ‘SW2(config) #usemame admin2 password abed1234 SWA(config) fusername admin! seoret abed1234 SW2{eonfig-ine) ine vty 0.15 ‘SW4{config) #username admin? secret abed 1234 'SW2{config-ine) #login local ‘SW4(config-ine) sine console 0 'SW4{config-ine) #login local A swt B sw2 D. sw4 How do TOP and UDP serine wa ey ore iii den of paces? |A TOP dees nol uararze dlr orem choking onsu hat eis n emu cf eta UDP prone massag acinoadgemanl antretansis details, (© ToPisacannectnes pte at oes nt proaerelate debe ota UDPs 2 connecor-neneaprteo aluses Sequencng to proc lane die '. ToP uses windovingte deer packets relat UDP proses relale message tanlretneen oss by ecablshing ete vay handshat, Which type of ipvé address is publicly routable in the same way as ipv4 public addresses? A. multicast 8. unique local C. link-local giort }98.51.100.1 DHCP server 198.51.100.100 138 complete and corect Wich we Ses of commands must be conigured nt andR2Z fo complete he sk? (Choose vo) A Rilconigiinetce fa Fi(contosti#pnelpe-adcose 108.41.100.100, 2. Rafeongs inerace a0 Ro{coesiip addiess deo Rifconginetce fa ilconpsttip neipersaotess 192022 ‘The Sw1 inferace gor Is In Me dewnidown state Wihich two conf gurations are vad reasons for he interface conction? (Choose wo ) ‘A. There is protocol mismatch 1B Theres 2 cuplex mismaten D. The interface is eror-ciscblee oer oe eit What commande ate toads cubic a Ear on 8 alow for VLAN 2, wih P across 10.20.201247 switchport mode trunk A. Ri(config)#interface ethemet0/0 R1(config)#encapsulaton dotq 20 Ri(config)#ip address 10.20.20.1 255.255.2560 C. RA(configy#inierface ethernetO/0 20 Ri(config)#ip address 10.20.20.1 255.255.2560 1D. Ri(contgy#interface emernetO/o Ri(config)#ip address 10.20.20.1 255.255.2560 E00 E00 Eon £0! Rt swt sw2 RE Swit ‘sw2: interface Ethernel00 interface EthernetO10 interface EherneiO7t ne ip adaress sitchport trunk encapsulation dottq ‘hitehport trunk encapsulation dotq 1 siitchport mode trunk switehport mode trunk interface EthernelO/1 interface Ethernet0/2 sitehpor trunk allowed vian 10 switehport access vien 20 sitehpor trunk encapsulation dottq shitchport mode access Which WPA3 enhancement protects against hackers viewing traffic on the Wi-Fi network? 8. TKP encyption ©. scrambled encyption key D. AES encyption Refer othe exhibit What configuration on RTR- denies SSH access fom PC-!f-any RTRHinfetface andllows all her tlc? RTR-A interface Loopback1 Gaol 172.16.1.62 ip address 192.168.1.1 255.255.255.0 interface Loopback? ip address 192.168.2.1 255.255.255.0 1 interface Loopback3 ip address 192.168.3.1 255.255.255.0 i interface Gigabit€thernet0/0 ip address 172.16.1.62 255.255.255.224 172.16.1.33/27 access-list 100 deny tcp host 172.16.1.33 any eq 22 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in access-list 100 deny tep host 172.16.1.33 any eq 22 access-list 100 permit ip any any line vty 0.15 access-class 100 in access-list 100 deny tep host 172.16.1.33 any eq 23 access-list 100 permit ip any any interface GigabitEthernet0/0 ip access-group 100 in access-list 100 deny tep host 172.16.1.33 any eq 23 access-list 100 permit j line vty 015 access-class 100 in Router R1 must send all traffic without a matching routing-table entry to 192. 168.11 R1{config#ip route default-route 192.168.1.1 B. R1#Config t Ri(config)#ip routing R1{config}#ip route 192.168.1.1 0.0.0.0:0.0.0.0 D. R1#Configt Ri(config)#ip routing Ri(config)#ip default-gateway 192.168.1.1 nich action must be taken to assign a global unicast Py6 address on an interlace thtis derwetfom the MAC address oftntinteriace? ‘A. explicity assign a inileeal adress B. dsable me EUr-64 at process D. congue a statetul DHCP server cn he network In which two ways does a password manager teduce the chance of a hacker stealing a user's passwo1d? (Choose two) uses an internal frewall to protect the password repository from unauthorized access C. stores the pasword rapasitory onthe local workstction with builtin antvirus and enti malware functionality . automatically provides a second authantcation factor thatis unknown te the enginal user

You might also like