QUESTION85 An engineer is configuring switch SW1 to act as an NTP server when all upstream NTP server connectivity fails. Which configuration must be used?
SW1# config t
SW1(config)#ntp server 192.168.1.1 SW1(config)#ntp access-group server accesslist1
SW1# config t
SW1(config)#ntp server 192.168.1.1
SW1# config t SW1(config)#ntp master
SW1(config)#ntp server 192.168.1.1
CorrectAnswer: D
QUESTION86 Refer to the exhibit.
An OSPF neighbor relationship must be configured using these guidelines:
R1 is only permitted to establish a neighbor with R2.
R1 will never participate in DR elections.
R1 will use a router-id of 10.1.1.1. Which configuration must be used? Option A OSPF_config_3_OptionA.jpg Option B OSPF_config_3_OptionB.jpg Option C OSPF_config_3_OptionC.jpg Option D OSPF_config_3_OptionD.jpg
A.
B.
C.
D.
CorrectAnswer: B
QUESTION87 How does authentication differ from authorization?
Authentication verifies the identity of a person accessing a network, and authorization determines what resource a user can access
Authentication is used to determine what resources a user is allowed to access, and authorization is used to track what equipment is allowed access to the network
Authentication is used to verify a person’s identity, and authorization is used to create syslog messages for logins
Authentication is used to record what resource a user accesses, and authorization is used to determine what resources a user can access