Which ACL can be used?

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet. Which ACL can be used?A . reflexiveB . extendedC . standardD . dynamicView AnswerAnswer: D

March 30, 2018 No Comments READ MORE +

Where information about untrusted hosts are stored?

Where information about untrusted hosts are stored?A . CAM tableB . Trunk tableC . MAC tableD . binding databaseView AnswerAnswer: D Explanation: Builds and maintains the DHCP snooping binding database, which contains information about untrusted hosts with leased IP addresses.

March 29, 2018 No Comments READ MORE +

Which two statements about access points are true? (Choose Two)

Which two statements about access points are true? (Choose Two)A . They can provide access within enterprises and to the public.B . in Most cases, they are physically connected to other network devices to provide network connectivityC . They can protect a network from internal and external threats.D . Most...

March 29, 2018 No Comments READ MORE +

What can you change to select switch as root bridge?

What can you change to select switch as root bridge?A . make lower priorityB . make higher priorityC . make lower path costD . make higher path costView AnswerAnswer: A

March 29, 2018 No Comments READ MORE +

Which three statements about HSRP operation are true? (Choose three.)

Which three statements about HSRP operation are true? (Choose three.)A . The virtual IP address and virtual address are active on the HSRP Master router.B . The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C . HSRP supports only clear-text authentication.D . The...

March 25, 2018 No Comments READ MORE +

Which of the following will correct the problems?

Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? (Choose two.)A . Configure the gateway on Host A as 10.1.1.1.B . Configure the gateway on Host B as 10.1.2.254.C . Configure the IP address of Host A...

March 25, 2018 No Comments READ MORE +

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?

Which layer in the OSI reference model is responsible for determining the availability of the receiving program and checking to see if enough resources exist for that communication?A . transportB . networkC . presentationD . sessionE . applicationView AnswerAnswer: E

March 25, 2018 No Comments READ MORE +

Which of the following should the security administrator implement in order to meet this requirement?

In order to comply with new auditing standards, a security administrator must be able to correlate system security alert logs directly with the employee who triggers the alert. Which of the following should the security administrator implement in order to meet this requirement?A . Access control lists on file serversB...

March 24, 2018 No Comments READ MORE +

Where does routing occur within the DoD TCP/IP reference model?

Where does routing occur within the DoD TCP/IP reference model?A . applicationB . internetC . networkD . transportView AnswerAnswer: B

March 24, 2018 No Comments READ MORE +

Which command can you enter to determine whether a switch is operating in trunking mode?

Which command can you enter to determine whether a switch is operating in trunking mode?A . show ip interface briefB . show vlanC . show interfacesD . show interface switchportView AnswerAnswer: D

March 23, 2018 No Comments READ MORE +