|
|||||||
АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция |
The network administrator wants to verify Layer 2 connectivityWhich statement is true about CDP on a Cisco device? To disable CDP globally, the no cdp enable command in interface configuration mode must be used. The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity. CDP can be disabled globally or on a specific interface. Because it runs at the data link layer, the CDP protocol can only be implemented in switches. What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router? To list the content of the NVRAM to clear the content of the NVRAM to copy the directories from the NVRAM to direct all new files to the NVRAM A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario? identify theft data loss Information theft disruption of service If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router? Edit the configuration file with a text editor. Use the dir command from the router to remove the windows automatic alphabetization of the files on the flash drive. Convert the file system from FAT32 to FAT16. Change the permission on the file from ro to rw. Which network design consideration would be more important to a large corporation than to a small business? Internet router Redundancy firewall low port density switch Which protocol supports rapid delivery of streaming media? TCP RTP SNMP PoE Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting? SW2 R1 R2 PC2 SW1 Which two statements characterize wireless network security? (Choose two.) Wireless networks offer the same security features as wired networks. An attacker needs physical access to at least one network device to launch an attack Using the default IP address on an access point makes hacking easier. Some RF channels provide automatic encryption of wireless data. With SSID broadcast disabled, an attacker must know the SSID to connect. Which two actions can be taken to prevent a successful attack on an email server account? (Choose two.) Поиск по сайту: |
Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.) |