A network engineer issues a show running-config command and sees only one line of output that mentions the enable secret command, as follows: enable secret 5 $1$ZGMA$e8cmvkz4UjiJhVp7.maLE1.Which of the following is true about users of this router?

3) A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows:

Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.)

4) In the following excerpt from a command on a Mac, which of the following parts of the output represent information learned from a DHCP server? (Choose two answers.)

6) DHCP Snooping has already been configured in the network shown in the figure, and you plan to add DAI configuration that relies on the DHCP Snooping Binding Table. Which answer shows the best configuration for switch SW2, specifically for VLAN 20?

7) Your organization requires all traffic to be encrypted and communications to be secure. From the different protocols listed, which protocol meets these requirements and supports AAA?

8) Which options are true about TACACS+? (Select three answers.)

9) Which one of the following is the goal of a brute-force attack?

10) A network engineer issues a show running-config command and sees only one line of output that mentions the enable secret command, as follows: enable secret 5 $1$ZGMA$e8cmvkz4UjiJhVp7.maLE1.Which of the following is true about users of this router?

DETAILED ASSIGNMENT

20200929052025week_quiz

Powered by WordPress