Tag Archives: ports

VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50?

Refer to the exhibit. VLANs 50 and 60 exist on the trunk links between all switches. All access ports on SW3 are configured for VLAN 50 and SW1 is the VTP server. Which command ensures that SW3 receives frames only from VLAN 50? A. SW1(config)#vtp mode transparent B. SW3(config)#vtp mode transparent C. SW2(config)#vtp pruning D. SW1(config)#vtp pruning Answer:… Read More »

Which two ports do network devices typically use for CoA? (Choose two.)

A. 19005 B. 443 C. 3799 D. 8080 E. 1700 Answer: Option C, E. Explanation:  Reference: https://documentation.meraki.com/MR/Encryption_and_Authentication/Change_of_Authorization_with_RADIUS_(CoA)_on_MR_Access_Points Show AnswerDiscussion The post Which two ports do network devices typically use for CoA? (Choose two.) appeared first on Majanto.

An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices. Which deployment mode should be used to achieve this?

A. closed B. high-impact C. low-impact D. open Answer: Option C. Explanation:  Reference: https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptivedeployment-guide/ta- p/3641515 Show AnswerDiscussion The post An engineer is configuring 802.1X and wants it to be transparent from the users’ point of view. The implementation should provide open authentication on the switch ports while providing strong levels of security for non-authenticated devices.<br> Which deployment mode… Read More »

An organization wants to standardize the 802.1X configuration on their switches and remove static ACLs on the switch ports while allowing Cisco ISE to communicate to the switch what access to provide. What must be configured to accomplish this task?

A. dynamic access list within the authorization profile B. extended access-list on the switch for the client C. security group tag within the authorization policy D. port security on the switch based on the client’s information Answer: Option C. Explanation:  No answer description available for this question Show AnswerDiscussion The post An organization wants to standardize the 802.1X… Read More »

An organization is adding new profiling probes to the system to improve profiling on Cisco ISE. The probes must support a common network management protocol to receive information about the endpoints and the ports to which they are connected. What must be configured on the network device to accomplish this goal?

A. ICMP B. WCCP C. ARP D. SNMP Answer: Option D. Explanation:  Reference: https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol Show AnswerDiscussion The post An organization is adding new profiling probes to the system to improve profiling on Cisco ISE. The probes must support a common network management protocol to receive information about the endpoints and the ports to which they are connected.<br> What… Read More »

Which command displays all 802.1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch?

A. show authentication sessions interface Gi1/0/x output B. show authentication sessions C. show authentication sessions output D. show authentication sessions interface Gi 1/0/x Answer: Option D. Explanation:  Reference: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/s1/sec-s1-xe-3se-3850-cr-book/sec-s1-xe-3se-3850-crbook_chapter_01.html#wp3404908137 Show AnswerDiscussion The post Which command displays all 802.1X/MAB sessions that are active on the switch ports of a Cisco Catalyst switch? appeared first on Majanto.

Which two ports do network devices typically use for CoA? (Choose two.)

A. 19005 B. 443 C. 3799 D. 8080 E. 1700 Answer: Option C, E. Explanation:  Reference: https://documentation.meraki.com/MR/Encryption_and_Authentication/Change_of_Authorization_with_RADIUS_(CoA)_on_MR_Access_Points Show AnswerDiscussion The post Which two ports do network devices typically use for CoA? (Choose two.) appeared first on Majanto.

A customer has implemented Cisco FlexConnect deployments with different WLANs around the globe and is opening a new branch in a different location. The engineer’s task is to execute all the wireless configuration and to suggest how to configure the switch ports for new APs. Which configuration must the switching team use on the switch port?

Refer to the exhibit. A customer has implemented Cisco FlexConnect deployments with different WLANs around the globe and is opening a new branch in a different location. The engineer’s task is to execute all the wireless configuration and to suggest how to configure the switch ports for new APs. Which configuration must the switching team use on the… Read More »

Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols towork? (Choose two.)

A. 22 B. 23 C. 80 D. 443 E. 880 Answer: Option A, D. Explanation:  No answer description available for this question. Show AnswerDiscussion The post Access to the management interface of devices must be restricted by using SSH and HTTPS. Which two ports must be included in the ACLs for the protocols towork? (Choose two.) appeared first… Read More »