Check today and yesterday's blog posts for my latest CCNA Security exam tutorial!
CCNA Certification And CCENT Certification:
Identify the protocols that create trunks between switches.
C. IEEE 802.1q
Answer: A, C. Our trunking protocols are ISL and IEEE 802.1q, which is generally referred to as "dot1q".
CCNA Security Certification / CCNP ISCW Exam:
Describe the general operation of a smurf attack.
Answer: Basically, the attacker sends a huge number of pings to IP broadcast addresses, and these pings all have the source IP address of the attack's victim. When the hosts on that broadcast network all reply (with ICMP Echo Reply packets), the victim is overwhelmed and cannot function properly.
The following formula is used to arrive at what value?
100,000,000 / BW in BPS
CCNP Certification / BCMSN Exam:
Match the Etherchannel negotiation protocols LACP and PAgP to their available modes. Not all choices will be used. (The protocols have been placed after the correct choices.)
A. dynamic - PaGP
B. passive - LACP
C. auto - PaGP
E. active - LACP
When you use SDM to create a QoS policy, that policy will be used to provide QoS to two different traffic types. Name each and describe the traffic subject to each policy.
Answer: The traffic types are Real-Time and Business Critical, and you can see the traffic sub-classes in the follow screen shot from my ONT Study Guide.
More questions for you later today! Also, be sure to check today and yesterday's blog posts for links to new CCNA Security videos and tutorials!
To your success,