An organization secures its network with multi-factor authentication using an authenticator app on employee smartphones. How is the application secured in the case of a user’s smartphone being lost or stolen? The application requires the user to enter a PIN before it provides the second factor. The application requires an administrator password to reactivated after a configured interval. The application challenges a user by requiring an administrator password to reactivate when the smartphone is rebooted. The application verifies that the user is in a specific location before it provides the second factor. Refer to the exhibit. An engineer booted a new switch and applied this configuration via the console port. Which additional configuration must be applied to allow administrators to authenticate directly to enable privilege mode via Telnet using local username and password? R1(config)#username admin secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local
R1(config)#enable secret p@ss1234 1(config)#username admin privilege 15 secret p@ss1234
R1(config-if)#line vty 0 4
R1(config-line)#login local R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234 R1(config)#username admin
R1(config-if)#line vty 0 4
R1(config-line)#password p@ss1234
R1(config-line)#transport input telnet. Which type of attack can be mitigated by dynamic ARP inspection? malware DDos man-in-the-middle worm. What are two recommendations for protecting network ports from being exploited when located in an office space outside of an IT closet? (Choose two) configure static ARP entries implement port-based authentication enable the PortFast feature on ports
configure ports to a fixed speed shut down unused ports. What is a practice that protects a network from VLAN hopping attacks? Enable dynamic ARP inspection Implement port security on internet-facing VLANs Configure an ACL to prevent traffic from changing VLANs Change native VLAN to an unused VLAN ID. Which technology can prevent client devices from arbitrarily connecting to the network without state remediation? 802.11n IP source guard 802.1x MAC authentication bypass. Which technology is used to improve web traffic performance by proxy caching? Firepower WSA FireSIGHT ASA. Which device performs stateful inspection of traffic? access point wireless controller switch firewall.