Exhibit:
You work as a network administrator at.You study the exhibit carefully. Three different wireless groups of users (support, staff, guests) are permitted to access the wireless LAN.
Which security policy should be implemented for the users in the guests group? ()
A.LEAP authentication
B.Primary SSID with open or no WEP authentication
C.Static WEP and authentication
D.Open authentication with WEP plus MAC authentication
您可能感興趣的試卷
你可能感興趣的試題
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.
What supported authentication server should be chosen?()
A.TACACS with LEAP extensions
B.RADIUS with EAP extensions
C.TACACS+
D.LDAP
You work as a network engineer for . You study the switch exhibit carefully.
Which two statements are true? ()
Exhibit:
A.The trust boundary is not on this switch.
B.It is displaying the AutoQos configuration that was initially applied.
C.Interface Fa0/3 trusts allCoS values.
D.The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E.The show auto qos command shows the user-defined QoS settings.
F.The show auto qos command does not display user configuration changes currently in effect.
A.DAI intercept all ARP packets on untrusted ports
B.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
C.DAI is used to prevent against a DHCP Snooping attack.
D.DAI forwards all ARP packets received on a trusted interface without any checks.
E.DAI forwards all ARP packets on untrusted ports.
F.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
A.Classifying and marking traffic should be done as close to the traffic source as possible.
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.
Refer to the exhibit.
What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()
A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1.
最新試題
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()
What two things will occur when an edge port receives a BPDU?()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
What is the configured priority value of the Vlan105’s group on DS2 ?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Which statement is correct about RSTP port roles?()