A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

A company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be…

Continue ReadingA company is developing a security policy for secure communication. In the exchange of critical messages between a headquarters office and a branch office, a hash value should only be recalculated with a predetermined code, thus ensuring the validity of data source. Which aspect of secure communications is addressed?

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which…

Continue ReadingRefer to the exhibit. Routers R1 and R2 are connected via a serial link. One router is configured as the NTP master, and the other is an NTP client. Which two pieces of information can be obtained from the partial output of the show ntp associations detail command on R2? (Choose two.)

Refer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router command line. After removing the USB drive and connecting it to a PC, the administrator discovers that the running configuration was not properly backed up to the R1-config file. What is the problem?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Refer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router…

Continue ReadingRefer to the exhibit. An administrator is trying to back up the current running configuration of the router to a USB drive, and enters the command copy usbflash0:/R1-config running-config on the router command line. After removing the USB drive and connecting it to a PC, the administrator discovers that the running configuration was not properly backed up to the R1-config file. What is the problem?

Which statement describes a characteristic of Cisco Catalyst 2960 switches?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which statement describes a characteristic of Cisco Catalyst 2960 switches? They are modular switches. New Cisco Catalyst 2960-C switches support PoE pass-through. They do not support an active switched virtual…

Continue ReadingWhich statement describes a characteristic of Cisco Catalyst 2960 switches?

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Which type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency? link-state request hello database description link-state update Explanation & Hint: In OSPF…

Continue ReadingWhich type of OSPF packet is used by a router to discover neighbor routers and establish neighbor adjacency?

Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID? 10.0.0.1 10.1.0.1 192.168.1.100 209.165.201.1 Explanation & Hint: In OSPF…

Continue ReadingRefer to the exhibit. If no router ID was manually configured, what would router R1 use as its OSPF router ID?

Why is QoS an important issue in a converged network that combines voice, video, and data communications?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

Why is QoS an important issue in a converged network that combines voice, video, and data communications? Data communications are sensitive to jitter. Data communications must be given the first…

Continue ReadingWhy is QoS an important issue in a converged network that combines voice, video, and data communications?

Match the functions to the corresponding layers. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Match the functions to the corresponding layers. (Not all options are used.) Explanation & Hint: In a typical three-tier network design, the functionalities would be distributed across the access, distribution,…

Continue ReadingMatch the functions to the corresponding layers. (Not all options are used.)

Match the term to the web link http://www.buycarsfromus.com/2020models/ford/suv.html#Escape component. (Not all options are used.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

Match the term to the web link http://www.buycarsfromus.com/2020models/ford/suv.html#Escape component. (Not all options are used.) Explanation & Hint: Fragment: The fragment in this URL is #Escape. It refers to a specific section within…

Continue ReadingMatch the term to the web link http://www.buycarsfromus.com/2020models/ford/suv.html#Escape component. (Not all options are used.)

Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Refer to the exhibit. Which sequence of commands should be used to configure router A for OSPF? router ospf 1 network 192.168.10.64 0.0.0.63 area 0 network 192.168.10.192 0.0.0.3 area 0…

Continue ReadingRefer to the exhibit. Which sequence of commands should be used to configure router A for OSPF?

Which two statements are characteristics of a virus? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two statements are characteristics of a virus? (Choose two.) A virus has an enabling vulnerability, a propagation mechanism, and a payload. A virus typically requires end-user activation. A virus…

Continue ReadingWhich two statements are characteristics of a virus? (Choose two.)

What are three advantages of using private IP addresses and NAT? (Choose three.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:3 mins read

What are three advantages of using private IP addresses and NAT? (Choose three.) improves the performance of the router that is connected to the Internet reduces CPU usage on customer…

Continue ReadingWhat are three advantages of using private IP addresses and NAT? (Choose three.)

What type of network uses one common infrastructure to carry voice, data, and video signals?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:1 mins read

What type of network uses one common infrastructure to carry voice, data, and video signals? switched converged borderless managed Explanation & Hint: The type of network that uses one common…

Continue ReadingWhat type of network uses one common infrastructure to carry voice, data, and video signals?

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

In which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network? Narrow the scope. Document the…

Continue ReadingIn which step of gathering symptoms does the network engineer determine if the problem is at the core, distribution, or access layer of the network?

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.)

  • Post author:
  • Post category:Blog
  • Post comments:0 Comments
  • Post last modified:June 12, 2024
  • Reading time:2 mins read

Which two things should a network administrator modify on a router to perform password recovery? (Choose two.) the startup configuration file system ROM the NVRAM file system the system image…

Continue ReadingWhich two things should a network administrator modify on a router to perform password recovery? (Choose two.)