Refer to the exhibit. Switch#show etherchannel summary



Yüklə 2,03 Mb.
Pdf görüntüsü
səhifə9/39
tarix13.12.2023
ölçüsü2,03 Mb.
#174656
1   ...   5   6   7   8   9   10   11   12   ...   39
ccna new qstns 6

Answer:

Question 27
Refer to the exhibit. 
A static route must be configured on R14 to forward traffic for the 172.21.34.0/25 network that 
resides on R86. Which command must be used to fulfill the request? 
A. ip route 172.21.34.0 255.255.255.192 10.73.65.65 
B. ip route 172.21.34.0 255.255.255.0 10.73.65.65 
C. ip route 172.21.34.0 255.255.128.0 10.73.65.64 
D. ip route 172.21.34.0 255.255.255.128 10.73.65.66 
Answer:_D_Question_28'>Answer:

Question 28
What is a function of Opportunistic Wireless Encryption in an environment? 
A. offer compression 
B. increase security by using a WEP connection 
C. provide authentication 
D. protect traffic on open networks 


Answer:

Explanation
Opportunistic Wireless Encryption (OWE) is an extension to IEEE 802.11 that provides 
encryption of the wireless medium. The purpose of OWE based authentication is avoid open 
unsecured wireless connectivity between the AP’s and clients. The OWE uses the Diffie-
Hellman algorithms based Cryptography to setup the wireless encryption. 
Reference: 
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/16-12/config-
guide/b_wl_16_12_cg/wpa3.html
 
Question 29
Refer to the exhibit. 
A company is configuring a failover plan and must implement the default routes in such a way 
that a floating static route will assume traffic forwarding when the primary link goes down. 
Which primary route configuration must be used? 
A. ip route 0.0.0.0 0.0.0.0 192.168.0.2 GigabitEthernet1/0 
B. ip route 0.0.0.0 0.0.0.0 192.168.0.2 tracked 
C. ip route 0.0.0.0 0.0.0.0 192.168.0.2 floating 
D. ip route 0.0.0.0 0.0.0.0 192.168.0.2 
Answer:

Question 30
Which action implements physical access control as part of the security program of an 
organization? 
A. setting up IP cameras to monitor key infrastructure 
B. backing up syslogs at a remote location 
C. configuring enable passwords on network devices 
D. configuring a password for the console port 

Yüklə 2,03 Mb.

Dostları ilə paylaş:
1   ...   5   6   7   8   9   10   11   12   ...   39




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin