A network engineer is configuring an OSPFv2 neighbor adjacency. Drag and drop the parameters from the left onto their required categories on the right. No all parameters are used. netmask OSPF proccess ID router ID IP address area ID timers. Drag and drop the threat-mitigation techniques from the left onto the types of threat or attack they mitigate on the right. configure BPDU guard configure dynamic ARP inspection configure root guard configure VACL. Drag and drop the Cisco Wireless LAN Controller security settings from the left onto the correct security mechanism categories on the right web policy passthrough WPA+WPA2 802.1X. Drag and drop the network protocols from the left onto the correct transport services on the right. FTP SMTP SNMP SSH TFTP VolP. Refer to the exhibit
Drag and drop the networking parameters from the left onto the correct values on the right. default gateway host IP address NIC MAC address NIC vendor OUI subnet mask. Drag and drop the AAA functions from the left onto the correct AAA services on the right. control the actions that a user can perform provides analytical information for the network administrator records user activities restricts the services that are avaliable to a user verifies the password associated with a user identifies the user. Drag and drop the IPv4 network subnets from the left onto the correct usable host ranges on the right. 172.28.228.144/18 172.28.228.144/21 172.28.228.144/23 172.28.228.144/25 172.28.228.144/29. Drag and drop the descriptions of file transfer protocols from the left onto the correct protocols on the right. provides reliability when loading as image upon boot up does not require user authetication uses port 69 uses port 20 and 21 uses TCP uses UDP. Drag drop the descriptions from the left on to the correct configuration-management technologies on the right. fundamental configuration elements are stored in a manifest uses TCP port 10002 for configuration push jobs uses Ruby for fundamental configuration elements use SSH for remote device communication uses TCP 8140 for communication uses YMAL for fundamental configuration elements. Drag and drop the WLAN components from the left onto the correct descriptions on the right. access point virtual interface dynamic interface service port wireless LAN controller. Drag and drop the functions from the left onto the correct network components on the right. resolves web URLs to IP address assings a default gateway to a client holds the TCP/IP settings to be distributed to the clients stores a list of IP address mapped to names assings IP address to enabled clients. Refer to the exhibit
Drag and drop the routing table components on the left onto the corresponding letter from the exhibit on the right not all options are used administrative distance metric next-hop interface outbound interface router source subnet mask timestamp. An interface has been configured with the access list that is shown below.
access-list 107 deny tcp 126.96.36.199.0.0.3.255 any eq http
access-list 107 permit ip any any
On the basis of that access list, drag each information packet on the left to the appropriate category on the right. source IP:188.8.131.52
destination application:http source IP:184.108.40.206
destination port:23 source IP:220.127.116.11
destination port:80 source IP:18.104.22.168
destination application:http source IP:22.214.171.124
destination port:53. Drag and drop the benefits of a cisco wireless Lan controller from the left onto the correct examples on the right. Dynamic RF Feature Easy Deployment Process Optimized user preformance Easy upgrade process. Drag and drop the application protocols from the left onto the transport protocols that is uses on the right. DHCP FTP SMTP SSH SNMP TFTP. Drag and drop the characteristics of networking from the left onto the correct networking types on the right focused on network focused on devices user input is a policy uses white list security model uses black list security model user input is a configuration. Match the functions to the corresponding layers. (Not all options are used.) provides high-speed backbone connectivity implements personal firewalls on the client computers provides network access to the user implements network access policy represents the network edge establishes Layer 3 routing boundaries functions as an aggregator for all the campus blocks.