QUESTION13 Which two wireless security standards use Counter Mode Cipher Block Chaining Message Authentication Code Protocol for encryption and data integrity? (Choose two)
WPA2
WPA3
WEP
WPA
Wi-Fi 6
CorrectAnswer: AB
QUESTION14 What is a practice that protects a network from VLAN hopping attacks?
Implement port security on internet-facing VLANs.
Configure an ACL to prevent traffic from changing VLANs.
Assign all access ports to VLANs other than the native VLAN.
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2 ia - IS-IS inter area, * - candidate default, U - per-user static route o - ODR, P - periodic downloaded static route, H - NHRP, l - LISP
+ - replicated route, % - next hop override Gateway of last resort is 10.56.0.1 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 10.56.0.1
10.0.0.0/8 is variably subnetted, 2 subnets, 2 masks
C 10.56.0.0/17 is directly connected, Vlan56 L 10.56.0.19/32 is directly connected, Vlan56
C 10.56.128.0/18 is directly connected, Vlan57 L 10.56.128.19/32 i directly connected, Vlan57
When router R1 is sending traffic to IP address 10.56.192.1, which interface or next hop address does it use to route the packet? A. 0.0.0.0/0
B. Vlan57
C. 10.56.0.1
D. 10.56.128.19