Drag and Drop Question Drag and drop the functions of DHCP from the left onto any of the positions on the right Not all functions are used.
Question 502
What is a zero-day exploit?
A. It is when a new network vulnerability is discovered before a fix is available
B. It is when the perpetrator inserts itself in a conversation between two parties and captures or alters data.
C. It is when the network is saturated with malicious traffic that overloads resources and bandwidth
D. It is when an attacker inserts malicious code into a SOL server.
Question 503
A network engineer is replacing the switches that belong to a managed-services client with new Cisco Catalyst switches. The new switches will be configured for updated security standards, including replacing Telnet services with encrypted connections and doubling the modulus size from 1024. Which two commands must the engineer configure on the new switches? (Choose two.)
A. crypto key generate rsa general-keys modulus 1024
B. transport input all
C. crypto key generate rsa usage-keys
D. crypto key generate rsa modulus 2048
E. transport Input ssh
Question 504
Which QoS queuing method discards or marks packets that exceed the desired bit rate of traffic flow?
A. shaping
B. policing
C. CBWFQ
D. LLQ
Question 505
Refer to the exhibit. Traffic sourced from the loopback0 interface is trying to connect via ssh to the host at 10.0.1.15. What is the next hop to the destination address?
A. 192.168.0.7
B. 192.168.0.4
C. 192.168.0.40
D. 192.168.3.5
Question 506
Refer to the exhibit. What is the next hop for traffic entering R1 with a destination of 10.1.2.126?
A. 10.165 20.126
B. 10.165.20.146
C. 10.165.20.166
D. 10.165 20.226
Question 507
Why would VRRP be implemented when configuring a new subnet in a multivendor environment?
A. when a gateway protocol is required that support more than two Cisco devices for redundancy
B. to enable normal operations to continue after a member failure without requiring a change In a host ARP cache
C. to ensure that the spanning-tree forwarding path to the gateway is loop-free
D. to interoperate normally with all vendors and provide additional security features for Cisco devices
Question 508
An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration tor a Secure Shell access RSA key?
A. crypto key Import rsa pem
B. crypto key pubkey-chain rsa
C. crypto key generate rsa
D. crypto key zeroize rsa
Question 509
An engineer is configuring SSH version 2 exclusively on the R1 router. What is the minimum configuration required to permit remote management using the cryptographic protocol?
A.
B.
C.
D.
Question 510
After a recent security breach and a RADIUS failure, an engineer must secure the console port of each enterprise router with a local username and password. Which configuration must the engineer apply to accomplish this task?