The lab and production networks use the same VTP domain name, so the network administrator made no configuration changes to S2 before adding it to the production network. What will solve the problem? Reset the revision number on S2 with either the delete VTP command or by changing the domain name and then changing it back
The new security policy for the company allows all IP traffic from the Engineering LAN to the Internet while only web traffic from the Marketing LAN is allowed to the Internet. If a network has converged, what is true about the link-state database held by each router in the same OSPF area? Each router has a link-state database containing the same status information
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers
What is the advantage of using WPA to secure a wireless network?It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.**It uses an advanced encryption key that is never transmitted between host and access point.It is supported on older wireless hardware, thus providing maximum compatibility with enterprise equipment.It requires the MAC address of a network device that is requesting wireless access to be on a list of approved MAC addresses.4. How is it likely that the hacker gained access to the network?The hacker used a software tool to crack the shared hexadecimal wireless key.**The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.The attacker mounted a denial of service attack to overwhelm the firewall before penetrating the wireless LAN.The hacker gained wireless access to the MAC address database and added his own MAC address to the list of permitted addresses.10
CCNA Discovery 4.1 - CCNA Discovery Answers - CCNA 4.1 Answers: CCNA 3 Chapter 6 V4.0
What is the purpose of the configuration commands added on router B?allows router A to form an adjacency with router Bprovides a stable OSPF router ID on router Bprovides a method of testing router trafficcreates the OSPF adjacency table on router B16Refer to the exhibit. What is the purpose of the value 128 shown in bold?It is the OSPF cost metric.It is the OSPF administrative distance.It is the value assigned by the Dijkstra algorithm that designates the distance in hops to the network.It is the value assigned to an interface that is used by the DUAL algorithm to determine the metric.15Refer to the exhibit
If three 802.11b access points need to be deployed in close proximity, which three frequency channels should be used? (Choose three.) 1 3 5 6 8 11 Which three Wi-Fi standards operate in the 2.4GHz range of frequencies? (Choose three.) 802.11a 802.11b 802.11g 802.11n 802.11ac Which security mode is the least secure choice when a home wireless router is configured? WPA WPA2 WEP WPA2-Personal A administrator wishes to extend the range of the existing IEEE 802.11n network without changing the AP. Which solution is the best method to enhance the performance of the wireless network? Replace the wireless NICs on the computers that are experiencing slow connections
In which situation would the use of PAP be preferable to the use of CHAP? when router resources are limited when multilink PPP is used when plain text passwords are needed to simulate login at the remote host when a network administrator prefers it because of ease of configuration A network administrator is evaluating authentication protocols for a PPP link. Which PPP option can detect links that are in a looped-back condition? Magic Number MRU Callback ACCM When configuring Multilink PPP, where is the IP address for the multilink bundle configured? on a physical serial interface on a subinterface on a multilink interface on a physical Ethernet interface Refer to the exhibit
No comments:
Post a Comment