Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 26 Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1?
Continue reading
March 21, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As
Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 21 The Company security administrator is concerned with layer 2 network attacks. Which two statements about these attacks are true? (Select two) A. ARP spoofing...
Continue reading
March 21, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As
Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 16 Refer to the exhibit. What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?
Continue reading
March 18, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As
Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 11 In the use of 802.1X access control, which three protocols are allowed through the switch port before authentication takes place? (Select three) A. EAP-over-LAN...
Continue reading
March 18, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As
Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 6 You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security...
Continue reading
March 17, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As
Section 2 – Implement a Security Extension of a Layer 2 solution, given a network design and a set of requirements QUESTION NO: 1 You need to configure port security on switch R1. Which two statements are true about this technology? (Select two) A. Port security can be...
Continue reading
March 17, 2011 admin
Section 2 - Security of Layer 2, SWITCH 642-813 Q&As