A clock offset B stratum C reference D dispersion Answer B Question 3 Which

A clock offset b stratum c reference d dispersion

This preview shows page 118 - 121 out of 265 pages.

A. clock offset B. stratum C. reference D. dispersion
Image of page 118
Answer: B Question 3 Which statement about NTP is true? A. each device is enabled as server by default B. the default authentication key number is 1 C. the default stratum number is 5 D. the default source of a NTP message is the interface connected to the next-hop for server peer address Answer: D ICND1 Security Questions Question 1 An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this? A. Enable port security and use the keyword sticky. B. Set the switchport mode to trunk and save the running configuration. C. Use the switchport protected command to have the MAC addresses added to the configuration. D. Use the no switchport port-security command to allow MAC addresses to be added to the configuration. Answer: A Question 2 The following commands are entered on the router: Burbank(config)# enable secret fortress Burbank(config)# line con 0 Burbank(config-line)# login Burbank(config-line)# password n0way1n Burbank(config-line)# exit Burbank(config)# service password-encryption What is the purpose of the last command entered?
Image of page 119
A. to require the user to enter an encrypted password during the login process B. to prevent the vty, console, and enable passwords from being displayed in plain text in the configuration files C. to encrypt the enable secret password D. to provide login encryption services between hosts attached to the router Answer: B Question 3 Why would a network administrator configure port security on a switch? A. to prevent unauthorized Telnet access to a switch port B. to prevent unauthorized hosts from accessing the LAN C. to limit the number of Layer 2 broadcasts on a particular switch port D. block unauthorized access to the switch management interfaces Answer: B Question 4 A company has placed a networked PC in a lobby so guests can have access to the corporate directory. A security concern is that someone will disconnect the directory PC and re-connect their laptop computer and have access to the corporate network. For the port servicing the lobby, which three configuration steps should be performed on the switch to prevent this? (Choose three) A. Enable port security. B. Create the port as a trunk port. C. Create the port as an access port. D Create the port as a protected port. E. Set the port security aging time to 0. F. Statically assign the MAC address to the address table. G. Configure the switch to discover new MAC addresses after a set time of inactivity. Answer: A C F Question 5 What is the effect of using the service password-encryption command?
Image of page 120
Image of page 121

You've reached the end of your free preview.

Want to read all 265 pages?

  • Fall '17
  • Haji
  • IP address, MAC address, Cisco Questions

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture