Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch? Select the best response.
what does the command aaa new-model enable?
By itself, what does the command aaa new-model enable? Select the best response.
What conclusion can you infer from this information?
Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:
Jan 9 08:00:42.623: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Standby -> Active
Jan 9 08:00:56.011: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Active -> Speak
Jan 9 08:01:03.011: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Speak -> Standby
Jan 9 08:01:29.427: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Standby -> Active
Jan 9 08:01:36.808: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Active -> Speak
Jan 9 08:01:43.808: %STANDBY-6-STATECHANGE: Standby: 49:
Vlan149 state Speak -> Standby
What conclusion can you infer from this information? Select the best response.
Which two items are most likely the cause of Switch1 not becoming the active router?
hostname Switch1
interface Vlan10
ip address 172.16.10.32 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 130
hostname Switch2
interface Vlan10
ip address 172.16.10.33 255.255.255.0
no ip redirects
standby 1 ip 172.16.10.110
standby 1 timers 1 5
standby 1 priority 120
HSRP was implemented and configured on two switches while scheduled network maintenance was performed.
After the two switches have finished rebooting, you notice via show commands that Switch2 is the HSRP active router. Which two items are most likely the cause of Switch1 not becoming the active router? (Choose two.)
Select 2 response(s).
what is the maximum number of secure MAC addresses that should be set on the port?
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port? Select the best response.
what is the default action taken by the switch if a violation occurs?
When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs?
Select the best response.
What is an important step to take when verifying a newly proposed network security solution?
What is an important step to take when verifying a newly proposed network security solution?
Select the best response.
What is needed to verify that a newly implemented security solution is performing as expected?
What is needed to verify that a newly implemented security solution is performing as expected?
Select the best response.
which two pieces of information should you have previously obtained to assist in designing the solution?
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? (Choose two.) Select 2 response(s).
Which two components should be part of a security implementation plan?
Which two components should be part of a security implementation plan? (Choose two.) Select 2 response(s).