CCNA Discovery 2 Module 8 Exam Answers Version 4.0
1. • accounting
2. • date and time of message
• ID of sending device
• message ID
3. • It uses a 128-bit pre-shared hexadecimal key to prevent unauthorized wireless access.
4. • packet filtering
5. • authentication
6. • reviewing backup logs
• performing trial backups
7. • poll
8. • SNMP
• Telnet
• TFTP
9. • The hacker obtained the MAC address of a permitted host, and cloned it on his wireless laptop NIC.
10. • Provide users with only the access to resources required to do their jobs.
• Allow users to decide how much permission they need to accomplish their job tasks.
11. • IPSEC
• SSL
• HTTPS
12. • encryption
13. • network management database
14. • Tape is not a cost-effective means of backing up data.
• Tape drives require regular cleaning to maintain reliability.
15. • DMZ
16. • ports
• protocols
17. • when the management interface of a device is not reachable across the network
18. • IPSEC
19. • full
20. • authentication
Tidak ada komentar:
Posting Komentar