A. clock offset B. stratum C. reference D. dispersion
Answer: B Question 3 Which statement about NTP is true? A. each device is enabled as server by default B. the default authentication key number is 1 C. the default stratum number is 5 D. the default source of a NTP message is the interface connected to the next-hop for server peer address Answer: D ICND1 – Security Questions Question 1 An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this? A. Enable port security and use the keyword sticky. B. Set the switchport mode to trunk and save the running configuration. C. Use the switchport protected command to have the MAC addresses added to the configuration. D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration. Answer: A Question 2 The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose of the last command entered?
A. to require the user to enter an encrypted password during the login process B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files C. to encrypt the enable secret password D. to provide login encryption services between hosts attached to the router Answer: B Question 3 Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port B. to prevent unauthorized hosts from accessing the LAN C. to limit the number of Layer 2 broadcasts on a particular switch port D. block unauthorized access to the switch management interfaces Answer: B Question 4 A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three) A. Enable port security. B. Create the port as a trunk port. C. Create the port as an access port. D Create the port as a protected port. E. Set the port security aging time to 0. F. Statically assign the MAC address to the address table. G. Configure the switch to discover new MAC addresses after a set time of inactivity. Answer: A C F Question 5 What is the effect of using the service password-encryption command?
You've reached the end of your free preview.
Want to read all 265 pages?
- Fall '17
- IP address, MAC address, Cisco Questions