Вы находитесь на странице: 1из 2

Which configuration must be in place for the auto-MDIX feature to function on a switch interface?

The speed and duplex of the interface must be configured for auto detect
What is the first action in the boot sequence when a switch is powered on?

load a power-on self-test program


A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two procedures that the technician should use to successfully complete this task? (Choose two.)

Define the asymmetrical keys. Configure authentication


A network administrator plugs a new PC into a switch port. The LED for that port changes to solid green. What statement best describes the current status of the port?

The port is operational and ready to transmit packets.


A network administrator has configured VLAN 99 as the management VLAN and has configured it with an IP address and subnet mask. The administrator issues the show interface vlan 99 command and notices that the line protocol is down. Which action can change the state of the line protocol to up?

Connect a host to an interface associated with VLAN 99.


In an Ethernet network, frames smaller than 64 bytes are called runts

runt What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.) Turn off unnecessary services. Change passwords regularly.
An attacker has bypassed physical security and was able to connect a laptop to a Ethernet interface on a switch. If all the switch ports are configured with port security and the violation mode is set to factory-default, which action is taken against the attacker?

Packets with unknown source addresses are dropped and the interface becomes errordisabled and turns off the port LED.
The initialism refers to a protocol that provides an encrypted connection. The protocol replaces the clear text Telnet protocol for Cisco device management.

ssh
What would be an ideal environment to carry out penetration tests?

on an off-line test bed network that mimics the actual production network How can DHCP packets be used to threaten a switched LAN?

Numerous DHCP requests are sent to the DHCP server from spoofed hosts, causing the DHCP address pool to become depleted.
What is the result of issuing the no switchport port-security mac-address sticky command on an interface with port security configured?

The sticky secure MAC addresses remain part of the address table but are removed from the running configuration.
Which configuration must be in place for the auto-MDIX feature to function on a switch interface?

The speed and duplex of the interface must be configured for auto detect
A network technician wants to implement SSH as the means by which a router may be managed remotely. What are two procedures that the technician should use to successfully complete this task? (Choose two.)

Configure authentication. Define the asymmetrical keys.


What are two ways to make a switch less vulnerable to attacks like MAC address flooding, CDP attacks, and Telnet attacks? (Choose two.)

Change passwords regularly.


Turn off unnecessary services.