АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

The network administrator wants to verify Layer 2 connectivity

Читайте также:
  1. A message is sent to all hosts on a remote network. Which type of message is it:directed broadcast
  2. Advantages and Disadvantages of Wireless Networking.
  3. COMPUTER NETWORKS
  4. Disadvantages of Wireless Networking
  5. Easier Network Setup
  6. Entertainment Network
  7. How does a networked server manage requests from multiple clients for different services:Each request is assigned source and destination port numbers.
  8. Network Emulator
  9. Network topology (Топологія мережі)
  10. Networking Mobile Clients
  11. Players
  12. Reimplement Design and Verify Pin Locations (Повторная реализация разработки и верификация размещения выводов).

Which statement is true about CDP on a Cisco device?

To disable CDP globally, the no cdp enable command in interface configuration mode must be used.

The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity.

CDP can be disabled globally or on a specific interface.

Because it runs at the data link layer, the CDP protocol can only be implemented in switches.

What is the purpose of issuing the commands cd nvram: then dir at the privilege exec mode of a router?

To list the content of the NVRAM

to clear the content of the NVRAM

to copy the directories from the NVRAM

to direct all new files to the NVRAM

A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario?

identify theft

data loss

Information theft

disruption of service

If a configuration file is saved to a USB flash drive attached to a router, what must be done by the network administrator before the file can be used on the router?

Edit the configuration file with a text editor.

Use the dir command from the router to remove the windows automatic alphabetization of the files on the flash drive.

Convert the file system from FAT32 to FAT16.

Change the permission on the file from ro to rw.

Which network design consideration would be more important to a large corporation than to a small business?

Internet router

Redundancy

firewall

low port density switch

Which protocol supports rapid delivery of streaming media?

TCP

RTP

SNMP

PoE

Refer to the exhibit. An administrator is trying to troubleshoot connectivity between PC1 and PC2 and uses the tracert command from PC1 to do it. Based on the displayed output, where should the administrator begin troubleshooting?

SW2

R1

R2

PC2

SW1

Which two statements characterize wireless network security? (Choose two.)

Wireless networks offer the same security features as wired networks.

An attacker needs physical access to at least one network device to launch an attack

Using the default IP address on an access point makes hacking easier.

Some RF channels provide automatic encryption of wireless data.

With SSID broadcast disabled, an attacker must know the SSID to connect.

Which two actions can be taken to prevent a successful attack on an email server account? (Choose two.)


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.)