Question 66
There are two managed legacy switches running that cannot be replaced or upgraded. These switches do not support cryptographic functions, but they are password protected. Which of the following should a network administrator configure to BEST prevent unauthorized access?
Question 67
A technician is searching for a device that is connected to the network and has the device's physical network address. Which of the following should the technician review on the switch to locate the device's network port?
Question 68
Which of the following will reduce routing table lookups by performing packet forwarding decisions independently of the network layer header?
Question 69
Which of the following topologies requires me MOST connections when designing a network?
Question 70
A network administrator wants to analyze attacks directed toward the company's network. Which of the following must the network administrator implement to assist in this goal?