Which two commands can be used to enable BPDU guard on a switch? (Choose two.)

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:1 mins read

Which two commands can be used to enable BPDU guard on a switch? (Choose two.) S1(config)# spanning-tree bpduguard default S1(config-if)# spanning-tree bpduguard enable S1(config-if)# enable spanning-tree bpduguard S1(config-if)# spanning-tree portfast…

Continue ReadingWhich two commands can be used to enable BPDU guard on a switch? (Choose two.)

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:2 mins read

Refer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the…

Continue ReadingRefer to the exhibit. Port Fa0/2 has already been configured appropriately. The IP phone and PC work properly. Which switch configuration would be most appropriate for port Fa0/2 if the network administrator has the following goals?

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:2 mins read

Which feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks? mixed duplex mode enabled for all ports by default the limited size of content-addressable memory space…

Continue ReadingWhich feature or configuration on a switch makes it vulnerable to VLAN double-tagging attacks?

Which type of malware is disguised as a legitimate program?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 25, 2024
  • Reading time:1 mins read

Which type of malware is disguised as a legitimate program? adware worm Trojan spyware Explanation & Hint: Trojan horses disguise themselves as legitimate programs. Worms replicate themselves across a network.…

Continue ReadingWhich type of malware is disguised as a legitimate program?

After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 25, 2024
  • Reading time:2 mins read

After complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of…

Continue ReadingAfter complaints from users, a technician identifies that the college web server is running very slowly. A check of the server reveals that there are an unusually large number of TCP requests coming from multiple locations on the Internet. What is the source of the problem?

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:1 mins read

How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0? 510 512 1022 1024 2046 2048 Answers Explanation & Hints: A mask of 255.255.252.0…

Continue ReadingHow many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0?

Which switching method uses the CRC value in a frame?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:1 mins read

Which switching method uses the CRC value in a frame? cut-through fast-forward fragment-free store-and-forward Answers Explanation & Hints: When the store-and-forward switching method is used, the switch receives the complete…

Continue ReadingWhich switching method uses the CRC value in a frame?

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 28, 2024
  • Reading time:2 mins read

A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best…

Continue ReadingA Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task?

An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)

  • Post author:
  • Post category:Uncategorized
  • Post comments:0 Comments
  • Post last modified:January 24, 2024
  • Reading time:2 mins read

An IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against…

Continue ReadingAn IT technician in a service company has provided extensive remote IT support with product deployment for a customer. After the completion of the contract, a complaint is filed against the IT technician for not following company policy by sending unsolicited emails about services and products that are not related to the contract. What two things should the IT support technician have done differently? (Choose two.)