QUESTION33 An engineer is configuring a switch port that is connected to a VoIP handset. Which command must the engineer configure to enable port security with a manually assigned MAC address of abcd.abcd.abcd on voice VLAN 4?
QUESTION34 Drag and drop the DNS commands from the left onto their effects on the right.
A. -> enables host-to-IP-address translation: ip domain-lookup
-> adds an entry to the host table: ip host switch_1 192.168.0.1
-> displays address-mapping information: show hosts
-> specifies the IP address of the DNS server: ip name-server
-> completes the FQDN of the DNS server: ip domain-name
CorrectAnswer: A
QUESTION35 How does encryption protect the wireless network?
via integrity checks to identify wireless forgery attacks in the frame
via specific ciphers to detect and prevent zero-day network attacks
via an algorithm to change wireless data so that only the access point and client understand it
via a policy to prevent unauthorized users from communicating on the wireless network
CorrectAnswer: C
QUESTION36 Which device segregates a network into separate zones that have their own security policies?