CCNA 200-125
CCNA 200-125
CCNA 200-125
Fichier Détails
Cartes-fiches | 478 |
---|---|
Utilisateurs | 26 |
Langue | English |
Catégorie | Informatique |
Niveau | Autres |
Crée / Actualisé | 20.02.2017 / 03.10.2024 |
Lien de web |
https://card2brain.ch/box/20170220_ccna_200125
|
Intégrer |
<iframe src="https://card2brain.ch/box/20170220_ccna_200125/embed" width="780" height="150" scrolling="no" frameborder="0"></iframe>
|
View the exhibit. The following commands are executed on interface fa0/1 of 2950SW:
2950SW(config-if)#switchport portsecurity
2950SW(config-if)#switchport portsecurity mac-address sticky
2950SW(config-if)#switchport portsecurity maximum 1
The Ethernet frame that is shown arrives on interface fa0/1. What two functions will occur when this frame is received by 2950SW? (Select two)
View the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port Fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.
Which two of these changes are necessary for SwitchA to meet the requirements? (Select two)
By default, how many MAC addresses are permitted to be learned on a switch port with port-security enabled?
Which statement about named ACLs is true?
A network administrator is configuring ACLs on a Cisco router, to allow traffic from hosts on networks 192.168.146.0, 192.168.147.0, 192.168.148.0, and 192.168.149.0 only. Which two ACL statements, when combined, would you use to accomplish this task? (Choose two)
Which statement about access lists that are applied to an interface is true?
Which identification number is valid for an extended ACL?
Which item represent the standard IP ACL?
Why would a network administrator configure port security on a switch?
Which condition does the err-disabled status indicate on an Ethernet interface?
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (Choose two)
When you are troubleshooting an ACL issue on a router, which command can help you to verify which interfaces are affected by the ACL?
What should be part of a comprehensive network security plan?
A network engineer wants to allow a temporary entry for a remote user with a specific username and password so that the user can access the entire network over the Internet. Which ACL can be used?
Which protocol authenticates connected devices before allowing them to access the LAN?
On which options are standard access lists based?
Which statement about RADIUS security is true?
What is a difference between TACACS+ and RADIUS in AAA?
A network administrator needs to configure port security on a switch. Which two statements are true? (Choose two)
Which Cisco platform can verify ACLs?
Which option is the default switchport port-security violation mode?
Select the action that results from executing these commands:
Switch(config-if)#switchport port-security
Switch(config-if)#switchport port-security mac-address sticky
A network administrator enters the following command on a router:
logging trap 3
What are three message types that will be sent to the Syslog server? (Choose three)
What is the effect of using the service password-encryption command?
What is the first step you perform to configure an SNMPv3 user?
Which command can you enter to configure a local username with an encrypted password and EXEC mode user privileges?
What command instructs the device to timestamp Syslog debug messages in milliseconds?
Which statement about the IP SLAs ICMP Echo operation is true?
What four levels will be trapped if the administrator executes the command
Router(cfg)#logging trap 4
Which version of SNMP first allowed user-based access?
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Select two)
Which command can you execute to set the user inactivity timer to 10 seconds?
What is the default Syslog facility level?
A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS image. What function does the router perform next?
Which step in the router boot process searches for an IOS image to load into the router?
Which feature can you use to monitor traffic on a switch by replicating it to another port or ports on the same switch?