|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
All wireless devices on the same WLAN must have the same SSIDconsists of a 32-character string and is not case sensitive Tells a wireless device to which WLAN it belongs Which type of network attack involves the disabling or corruption of networks, systems, or services? access attacks Denial of service attacks reconnaissance attacks malicious code attacks Which command will backup the configuration that is stored in NVRAM to a TFTP server? copy tftp running-config Copy startup-config tftp copy running-config tftp copy tftp startup-config Open the PT Activity. How long will a user be blocked if the user exceeds the maximum allowed number of unsuccessful login attempts? Minutes 1 minute 4 minutes 2 minutes Fill in the blank. Do not use abbreviations. The ” show version ” command that is issued on a router is used to verify the value of the software configuration register. What is a security feature of using NAT on a network? denies all packets that originate from private IP addresses Allows internal IP addresses to be concealed from external users denies all internal hosts from communicating outside their own network allows external IP addresses to be concealed from internal users A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack? containment, quarantine, treatment, and inoculation treatment, quarantine, inoculation, and containment inoculation, containment, quarantine, and treatment Containment, inoculation, quarantine, and treatment Which WLAN security protocol generates a new dynamic key each time a client establishes a connection with the AP? PSK WPA EAP WEP Refer to the exhibit. Baseline documentation for a small company had ping round trip time statistics of 36/97/132 between hosts H1 and H3. Today the network administrator checked connectivity by pinging between hosts H1 and H3 that resulted in a round trip time of 1458/2390/6066. What does this indicate to the network administrator? Something is causing interference between H1 and R1. H3 is not connected properly to the network. Performance between the networks is within expected parameters. Connectivity between H1 and H3 is fine. Something is causing a time delay between the networks. When should an administrator establish a network baseline? when the traffic is at peak in the network when there is a sudden drop in traffic at the lowest point of traffic in the network At regular intervals over a period of time A ping fails when performed from router R1 to directly connected router R2. The network administrator then proceeds to issue the show cdp neighbors command. Why would the network administrator issue this command if the ping failed between the two routers? The network administrator wants to verify the IP address configured on router R2. The network administrator suspects a virus because the ping command did not work. The network administrator wants to determine if connectivity can be established from a non-directly connected network. Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.003 сек.) |