Correct Answer: C
QUESTION 55
A WLC sends alarms about a rogue AP, and the network administrator verifies that the alarms are caused by a legitimate autonomous AP. How must the alarms be stopped for the MAC address of the AP?
Place the AP into manual containment.
Remove the AP from WLC management.
Manually remove the AP from Pending state.
Set the AP Class Type to Friendly.
Correct Answer: D
QUESTION 56
Which security method is used to prevent man-in-the-middle attack?
authorization
authentication
anti-replay
accounting
Correct Answer: B
Exam E
QUESTION 1
Refer to the exhibit.
ip arp inspection vlan 5-10 interface fastethernet0/1 switchport mode access switchport access vlan 5
What is the effect of this configuration?
Egress traffic is passed only if the destination is a DHCP server.
All ingress and egress traffic is dropped because the interface is untrusted.
All ARP packets are dropped by the switch.
The switch discards all ingress ARP traffic with invalid MAC-to-IP address bindings.
Correct Answer: D
QUESTION 2
Refer to the exhibit.
Which prefix did router R1 learn from internal EIGRP? A. 192.168.2.0/24
B. 192.168.1.0/24
C. 192.168.3.0/24
D. 172.16.1.0/24
Correct Answer: A
QUESTION 3
Refer to the exhibit.
Router R1 must be configured to reach the 10.0.3.0 network from the 10.0.1.0/24 segment. Which command must be used to configure the route? A. route add 10.0.3.0 0.255.255.255 10.0.4.2
B. route add 10.0.3.0 mask 255.255.255.0 10.0.4.3
C. ip route 10.0.3.0 0.255.255.255 10.0.4.2
D. ip route 10.0.3.0 255.255.255.0 10.0.4.3
Dostları ilə paylaş: |