Contact email:[email protected]
Answer of Two OSPF-enabled routers are connected over a point-to-point link. During the ExStart state, which router will be chosen as the first one to send DBD packets?
Answer of Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?
Answer of Which type of OSPFv2 packet is used to forward OSPF link change information?
Answer of An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 210 permit tcp 172.18.20.0 0.0.0.31 172.18.20.32 0.0.0.31 eq ftp .
If a packet with a source address of 172.18.20.14, a destination address of 172.18.20.40, and a protocol of 21 is received on the interface, is the packet permitted or denied?
Answer of A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?
Answer of In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?
Answer of In an OSPF network which OSPF structure is used to create the neighbor table on a router?
Answer of What command would be used as part of configuring NAT or PAT to define a pool of addresses for translation?
Answer of Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?
Answer of What is a characteristic of a Trojan horse as it relates to network security?
Answer of Refer to the exhibit. A network administrator has deployed QoS and has configured the network to mark traffic on the VoIP phones as well as the Layer 2 and Layer 3 switches. Where should initial marking occur to establish the trust boundary?
Answer of Refer to the exhibit. What three conclusions can be drawn from the displayed output? (Choose three.)
Answer of Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.)
Answer of Refer to the exhibit. A network administrator has configured OSPFv2 on the two Cisco routers but PC1 is unable to connect to PC2. What is the most likely problem?
Answer of A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?
Answer of What are the two types of VPN connections? (Choose two.)
Answer of Which type of API would be used to allow authorized salespeople of an organization access to internal sales data from their mobile devices?
Answer of An ACL is applied inbound on a router interface. The ACL consists of a single entry:
access-list 101 permit udp 192.168.100.32 0.0.0.7 host 198.133.219.76 eq telnet .
If a packet with a source address of 198.133.219.100, a destination address of 198.133.219.170, and a protocol of 23 is received on the interface, is the packet permitted or denied?
Answer of Which design feature will limit the size of a failure domain in an enterprise network?