Question 86

An email user has been lured into clicking a link in an email sent by their company's security organization.
The webpage that opens reports that it was safe but the link could have contained malicious code. Which type of security program is in place?
  • Question 87

    Refer to the exhibit.

    An extended ACL has been configured and applied to router R2. The configuration failed to work as intended.
    Which two changes stop outbound traffic on TCP ports 25 and 80 to 10.0.20.0/26 from the 10.0.10.0/26 subnet while still allowing all other traffic? (Choose two.)
  • Question 88

    An engineer has configured the domain name, user name, and password on the local router. What is the next step to complete the configuration for a Secure Shell access RSA key?
  • Question 89

    I1
    Which two command sequences must be configured on a switch to establish a Layer 3 EtherChannel with an open-standard protocol? (Choose two)
  • Question 90

    Which two of these are characteristics of the 802.1Q protocol? (choose two)