401
86. C. Ports that are connecting to trusted infrastructure devices such as routers and switches
should be trusted. This is because legitimate DHCP traffic could originate from these
ports. You would not want ports connecting to clients to be trusted, since this is the
purpose of enabling DHCP snooping. Web servers and DNS servers should also not be
trusted, since they are not facilitating DHCP.
87. C. The untrusted ports drop Offer and Acknowledgment DHCP messages. The only
device that should offer and acknowledge IP addresses is the DHCP server on a trusted
port. The untrusted ports do not allow Offer or Acknowledgment messages but will allow
Discover messages. All of the options except C are incorrect.
88. B. The command
radius-server host 192.168.1.5 key aaaauth will configure
the radius server 192.168.1.5 with a secret key of aaaauth. The command
radius host
192.168.1.5 key aaaauth is incorrect. The command radius-server 192.168.1.5
key aaaauth is incorrect. The command radius-server host 192.168.1.5 secret
aaaauth is incorrect.
89. A. Wi-Fi Protected Access (WPA) was rushed out and released to fix weak security in the
Wired Equivalent Privacy (WEP) wireless security protocol. WPA2 was formally released
to address weaknesses in the RC4-TKIP security protocol. WPA3 is the newest wireless
security protocol to be released and offers the highest level of security for wireless.
90. C. MAC filtering will allow you to set up a WLAN with Wi-Fi Protected Access (WPA)
with a pre-shared key (PSK) and restrict certain devices. A captive portal will not allow
you to restrict devices, only capture guests with a web page so they must log in. Although
you can restrict a user, you cannot restrict a particular device. A Remote Authentication
Dial-In User Service (RADIUS) server works in conjunction with AAA authentication and
is not implemented alongside of WPA PSK. Disabling broadcasting of the SSID is security
through obscurity and not a sufficient mechanism to restrict devices.
91. A. You can speed up the changing of all 50 router passwords with a Python script.
JavaScript Object Notation (JSON) is used for input and output of data; although it can
be used in conjunction with a script, it by itself is not a script language. You cannot apply
YAML or JSON templates to routers unless there is another mechanism, such as a script,
that is being used.
92. B. A negative outcome from automation of configuration across an enterprise is that
you increase the odds of configuration conflicts. You decrease the odds of typographical
errors when using automation because redundant commands do not need to be entered.
The time spent building configurations should be no more or no less than normal once an
automated system is established.
93. A. The Cisco Discovery Protocol (CDP) can be used to map out all of the Cisco devices
connected to the network. If you issue the command of
show cdp neighbors detail
or
show cdp entry *, the output will display all of the Cisco devices connected to the
switch or router the command is issue from. The running configuration will not display
the current devices connected. The Open Shortest Path First (OSPF) or Enhanced Interior
Gateway Routing Protocol (EIGRP) protocol will not display the directly connected
devices.
Do'stlaringiz bilan baham: |