Which two considerations about secure network management are important?
Which two considerations about secure network management are important? (Choose two.)
Which command enables Cisco IOS image resilience?
Which command enables Cisco IOS image resilience?
Which router management feature provides for the ability to configure multiple administrative views?
Which router management feature provides for the ability to configure multiple administrative
views?
Which two methods will help to mitigate this type of activity?
You suspect that an attacker in your network has configured a rogue Layer 2 device to intercept
traffic from multiple VLANs, which allows the attacker to capture potentially sensitive data.
Which two methods will help to mitigate this type of activity? (Choose two.)
Which statement describes a best practice when configuring trunking on a switch port?
Which statement describes a best practice when configuring trunking on a switch port?
Which type of Layer 2 attack causes a switch to flood all incoming traffic to all ports?
Which type of Layer 2 attack causes a switch to flood all incoming traffic to all ports?
What is the best way to prevent a VLAN hopping attack?
What is the best way to prevent a VLAN hopping attack?
Which statement about PVLAN Edge is true?
Which statement about PVLAN Edge is true?
which additional configuration parameter should be added to the trunking configuration?
If you are implementing VLAN trunking, which additional configuration parameter should be added
to the trunking configuration?
which three actions can be applied to a traffic class?
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied to a
traffic class? (Choose three.)