it ENABLES PORTFAST
FE80::/10
what mitigation plan is the best for thwarting a DOS attack THAT is creating a mac address table OVERFLOW
ENABLE PORT SECURITY
what are three techniques for mitigating vlan attacks
enable trunking manually
disable DTP
SET THE NATIVE VLAN TO AN UNUSED VLAN
WHICH INFORMATION DOES A SWITCH USE TO POPULATE THE MAC ADDRESS TABLE
SOURCE MAC
THE DESTINATION
THE DESTINATION AND MAC
THE OUTGOING PORT
THE SOURCE MAC ADDRESS AND THE INCOMING PORT
BECAUSE TO MAINTAIN THE MAC ADDRESS TABLE THE SWITCH USES THE SOURCE MAC ADDRESS OF THE INCOMING PACKETS AND THE PORT THAT THE PACKETS ENTER.
WHICH COMMMAND WILL START THE PROCESS TO BUNDLE TWO PHYSICAL INTERFACES TO CREATE AN ETHERCHANNEL GROUP VIA LACP
INTERFACE RANGE GIGABITETHERNET 0/4-5
What is the common term given to SNMP log messages taht are generated by network devices and sent to the SNMP server?
traps
which dhcpv4 message will a client send to accept an ipv4 that is OFFERED by a DHCP SERVER
BROADCAST DHCP REQUEST
UNICAST DHCP REQUEST
OMINICAST DHCP REQUEST
broadcast DHCP-RREQUEST
WHAT THREE COMPONENTS ARE COMBINED TO MAKEE A BRIDGE ID
COST ,
MAC ADDRESS
PORT ID
EXTENDED SYSTEMS ID
BRIDGE PRIORITY
IP ADDRESS
EXTENDED SYSTEMS ID
MAC ADDRESS
BRIDGE PRIORITY
DATA CAN TRANSMIT OVER REDUDANT SWITCH LINKS VIA WHAT PROTOCOL
DTP
STP
ETHERCHANNEL
SPACE COST TO COST
STP
A network administrator is adding a new WLAN on cisco 3500 series WLC. WHICH tab should the administrator use to create a new VLAN interface to be used for the new WLAN?
CONTROLLLER
NAME three PAgP channel establishment modes,
auto
desirable
ON
what are two characteristics of cisco express forwarding
this is the fastest forwarding mechanism on cisco routers and mutlilayer switches
packets are forwarded based on information in the f18 and an adjency table
SELECT THREE PAGP CHANNEL ESTABLISMENT MODES
AUTO
PASSIVE
DEFAULT
DESIRABLE
ON
DESIRABLE
ON
AUTO
WHAT WOULD BE A PRIMARY REASON AN ATTACKER WOUDL LAUNCH A MAC OVERFLOW ATTACK
SO THAT THE ATTACKER CAN SEE FRAMES THAT ARE DESTINED FOR OTHER HOST.
A STATIC ROUTE HAS BEEN CONFIGURED ON A ROUTER. HOWEVER THE DESTINATION NETWORK NO LONGER EXIST. WHAT SHOULD AN ADMINISTRATOR DO TO REMOVE THE STATIC ROUTE FROM THE ROUTING TABLE ?
REMOVE THE ROUTE USING THE NO IP ROUTE COMMAND?
which cisco solution helps prevent arp spoofing and arp poising
WHAT PROTOCOL OR TECH REQUIRES SWITCHES TO BE IN SERVER MODE OR CLIENT MODE
STP ETHERCHANNEL
VTP ETP
VTP
WHICH COMMAND WILL START THE PROCESS TO BUNDLE TWO PHYSICAL INTERFACES TO CREATE AN ETHERCHANNEL GROUP VIA LACP
SHOW BINDING
ENCAP DOT1q
INTERFACE RANGE G0/01-5
CHANNEL | GROUP MODE AUTO
INTERFACE RANGE G0/1- 5
WHICH 3 WIFI STANDARDS OPERATE IN TEH 2.4 HGZ RANGE OF FREQ.
802.11A
802.11B
802.11G
802.1A
802.11N
11A
11N
11G
WHICH TWO TYPES OF SPANNING PROTOCOLS CAN CAUSE SUBOOPTIMAL TRAFFIC FLOWS BECAUSE THEY ASSUME ONLY ONE SPANNING-TREE INSTANCE FOR THE ENTIRE BRIDGED NETWORK
RSTP
STP
which term describes the role of a cisco switch in teh 802.1x port based access control
agent
supplicant
authenticator
server
authenticator
WHAT ARE TWO REASONS A NETWORK ADMIN WOULD SEGMENT A NETWORK WITH A LAYER 2 SWITCH"?
ISOLATE TRAFFIC BETWEEN SEGMENTS
TO ENHANCE USER BANDWIDTH
CREATE MORE BRODCAST DOMAINS
STOP VIRUS ATTACKS BEFORE THEY CONTINUE FORWARD
ISOLATE TRAFFIC SEGMENTS
TO ENHANCE USER BANDWITH
ROUTED PORTS ON A MULTILAYER SWITCH ARE NOT AVAILABLE TO WHAT COMPONENT OF THE NETWORK
THEY ARE NOT ASSOCIATED WITH A VLAN
WHICH TWO PROTOCOLS ARE USED TO PROVIDE SERVER-BASED AAA AUTHENTICATION
TACAC+
RADIUS
STATIC
ENABLE IP ROUTING
TACACS+
RADIUS