Which IPsec security protocol should be used when confidentiality is required?
Which IPsec security protocol should be used when confidentiality is required?
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a s
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch? (choose two)
What are three benefits of implementing vlans?
What are three benefits of implementing vlans?(choose three)
which two statements are true?
A network administrator needs to configure port security on a switch.which two statements are true? (choose two)
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in secu
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuits and has built-in security mechanisms?
Which command will display the CHAP authentication process as it occur between two routers in the network?
All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?
What is valid reason for a switch to deny port access to new devices when port security is enabled?
What is valid reason for a switch to deny port access to new devices when port security is enabled?
How does using the service password encryption command on a router provide additional security?
How does using the service password encryption command on a router provide additional security?
Select the action that results from executing these commands:
Select the action that results from executing these commands:
Switch(config-if)# switchport port-security
Switch(config-if)# switchport port-security mac-address sticky
Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)