CCNP TSHOOT Chapter 4 Lab 4-2, Mixed Layer 2-3 Connectivity (Version 7)

Physical Topology Logical Topology Objectives Load the trouble ticket device configuration files for each trouble ticket. Diagnose and resolve problems related to switch virtual interfaces and multilayer switching. Diagnose and resolve problems related to First Hop Redundancy Protocols. Document troubleshooting progress, configuration changes, and problem resolution. Background Multilayer …

Quiz Chapter 11-13 CCNA CyberOps Version 1.1 Answers

1. Which statement describes an operational characteristic of NetFlow? NetFlow collects metadata about the packet flow, not the flow data itself. 2. What is the purpose of Tor? to allow users to browse the Internet anonymously 3. Threat actors may attack the    infrastructure in order to corrupt …

Quiz Chapter 9-10 CCNA CyberOps Version 1.1 Answers

1. If an asymmetric algorithm uses a public key to encrypt data, what is used to decrypt it? a private key 2. Which IETF standard defines the PKI digital certificate format? X.509 3. Which statement describes the use of hashing? Hashing can be used to detect accidental changes, …

Quiz Chapter 7-8 CCNA CyberOps Version 1.1 Answers

1. Which monitoring technology mirrors traffic flowing through a switch to an analysis device connected to another switch port? NetFlow SNMP SIEM SPAN 2. Which network technology uses a passive splitting device that forwards all traffic, including Layer 1 errors, to an analysis device? NetFlow network tap SNMP …

Quiz Chapter 5-6 CCNA CyberOps Version 1.1 Answers

1. Which network service synchronizes the time across all devices on the network? NTP SNMP NetFlow syslog 2. Fill in the blank. The distribution layer of the three-layer network design model aggregates data from the access layer. 3. Which network service allows administrators to monitor and manage network …

Quiz Chapter 1-2 CCNA CyberOps Version 1.1 Answers

1. After a security incident is verified in a SOC, an incident responder reviews the incident but cannot identify the source of the incident and form an effective mitigation procedure. To whom should the incident ticket be escalated? a SME for further investigation a cyberoperations analyst for help …