Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which Four Steps Are Needed To Configure A Voice Vlan On A Switch Port? (Choose Four).
Which four steps are needed to configure a voice VLAN on a switch port? (Choose four). As the IEEE 802.1Q trunk the configuration of the interface. On the switch, the port allocates the Voice VLAN. On an interface the activation of the spanning-tree port fast. Addition of a voice VLAN. Make sure voiRead more
Which four steps are needed to configure a voice VLAN on a switch port? (Choose four).
Answer: For the addition of IP phone some o the commands need to be added on the port which are:
What do you know about Voice VLAN?
A voice VLAN is designed for the user voice data streams.it works by ensuring that the voice quality is perfect by improving the transmission of the streams. When it is moving along with another kind of traffic. During the transmission of it with other traffic the voice has the advantage because it will prioritize as compared to others.
Working of the Voice VLAN:
For the priority, the voices streams need to be identified first. The identification of the voice data streams happens in two ways: The first one is MAC address-based mode that can determine the origin MAC addresses received frames, other is VLAN-based mode which finds the VLAN tags of the received frames.
MAC address-based mode:
In this mode, the switch works by determining whether the data streams are voice data or not on the base of the origin MAC address of the data frames which enter the interface. The switch performs the processing after the frames sent by the PC and IP phone which is: if the MAC address of the source is the same as the OUI configured on the switch. the voice VLAN tag add along with frames, and their priority increased. If the address does not match with OUI, then the PVID VLAN tag is attached with the frames and it will not send with its priority.
VLAN-based mode:
In this mode, the switch finds if the packets are the voice packet on the base of the VLAN ID that enters the interface.at first, the IP phone sends the packets to the switch. After the switch received the frames, it can add the voice VLAN information in the related field and send them back.
For the packets that contain the voice VLAN information, the IP sends them along with tags again, if they are the same as the configured voice VLAN on the switch, then the switch sends the priority of frames. This way helps the switch to ensure that when the network congestion happens the priority transmission of the voice packets happens.
PROS of the Voice VLAN:
The advantage of the voice VLAN is described below:
What Is Considered The Most Effective Way To Mitigate A Worm Attack?
What is considered the most effective way to mitigate a worm attack? Regularly update the password after 30 days. Determine whether the systems have the current virus or not. Make sure the configuration of the AAA in the network. Install the update from the operating system for security and also patRead more
What is considered the most effective way to mitigate a worm attack?
Answer: Worms mostly took the benefit of the vulnerable systems, that’s why the most effective way to mitigate the worm attack is to Install the update from the operating system for security and also patch the weak/vulnerable systems.
What do you know about worms?
A worm in the system is the malware type whose main goal is to replicate itself and try to infect other computers’ systems and also stay active on the system. The worms do the work by finding the operating system parts which are automatic and not visible to the end-users.
It is normal for the worms to be visible when they are out of control and utilize the resources of the systems and slow the task working in the computer.
Working of the worms:
Worms depend on the vulnerability in the system and network which help them to grow. When the worm completely loads in the system and infects it, then it’ll follow the main goal which is to stay in the system as long as it can and also try to flourish and infect other weak systems.
Example:
A worms WannaCry ransomware determines the weakness in the first server message block which is resource sharing in the windows. as it can begin the work in the system, the search for the other weak system begins. with the help of this client, the worms will grow and stay in the system for a long time.
The worms can make it look like the harmless resource as the links form or work file and when the client clicks on it they started to install it in the system.
How to mitigate worm attack
There are four steps that help in the mitigation of a worm attack:
Containment:
Containment is the first step that allows moving in an efficient way to contain worms spread and check the infected systems, and the devices whether they are patched or not. The infected system needs to be put separate from the remaining affected systems.
Inoculation:
In the second step after checking the affected systems, another weak system must be checked and also patched. The vulnerability which is used y the worms to flourish is patched which helps to contain the effect.
Quarantine:
In this worm mitigation step, the infected systems are isolated and removed from the network or system. If it is not possible to remove, then blocking comes in handy which kept the machine connected with the network.
Treat:
Treat is the last step in the mitigation process which is to remediate the system from attack and also determine the needed patching of the system. Based on the attack effect, the system has to be uninstalled, which helps to make sure the thorough cleaning of the worm attack.
See lessWhat Are Two Uses Of An Access Control List? (Choose Two.)
What are the two uses of an access control list? (Choose two.) ACLs work by managing the areas which help the host to have access to a network. ACLs give the security for access to networks. ACLs prevent any access to the specified application and ports. It can give permission or stop the traffic baRead more
What are the two uses of an access control list? (Choose two.)
Answer: Some of the uses of the ACLs are:
What are ACLs?
ACLs is the access control list which is defined as the rules set which help either the user or the system has access to the specific object or the service/resources.it is installed either in the router or switched, and it works to filter the traffic and maintain the traffic is allowed to access the network.
The systems are given the attribute for security which finds systems ACL. The list has the collection of the user who is allowed to access the system. The file system ACL has a special feature that allows to read the file present in the directory, rewrite the files, execute them if the file is executable. ACLs are also developed in operating systems like Windows, Linux, and in-network interfaces. in the network of computer, ACL work to restrain or give access to specific types of traffic. Mostly they filter the traffic on the base of source and destination.
Reason to use the ACLs:
The reason to use the ACL is to control the permission of the system or network of the computer.it is used to filter the incoming or outgoing traffic of the devices. The devices might be the networks that work as gateways or the endpoint for a network that is accessible directly by the user.
In the system, the users are given the control with some restriction according to their levels and roles, such as a user in the network administrator allowed to read, write or update for the sensitive files. On the other hand, some users are only allowed to read the files. ACL help to arrange the traffic for the efficient performance of the network and provide the network administrator control over the users in the network or system. one of its use is to provide security by restricting the malicious traffic.
Access control list has two types which are discussed in the following:
How Should Traffic Flow Be Captured In Order To Best Understand Traffic Patterns In A Network?
How should traffic flow be captured in order to best understand traffic patterns in a network? At the low utilization times. At the peak time of utilization. Only at the time of the main network segment. From the subset of the users. Answer: the traffic capture at the time of low utilization is notRead more
How should traffic flow be captured in order to best understand traffic patterns in a network?
Answer: the traffic capture at the time of low utilization is not good for the representation of various traffic types, and the reason is some of the traffic might be local to the specific segments, that’s why the capture is good if it is on different segments of the network.
What do you know about network traffic analysis?
Network traffic analysis is the process that can record, review, and also analyze the network traffic for the performance, security, normal operations of the network, and management.it can use both manual and auto methods to check the detail on a granular level and the network statistics.
The analysis is for an in-depth view of the traffic types which is moving within the network. Generally, the analysis was done with the help of network monitoring or the bandwidth software or application. The network traffic statistics helps to understand a few things which are:
Moreover, network security uses the method to determine the malicious frames in the traffic which might cause a problem. The network administrator uses it to check, review, download the speeds, content, etc to understand the operations. The method might also be useful for the hackers or intruders to check the pattern of the traffic and determine the weakness to break the security to get a hand on the sensitive data.
Some of the network traffic features which is useful are listed below:
Which Element Of Scaling A Network Involves Identifying The Physical And Logical Topologies?
Which element of scaling a network involves identifying the physical and logical topologies? Network traffic analysis. Network documentation. Device inventory. Budget analysis. Answer: for the network scaling some of the elements are needed which are: Network documentation: for scaling physical andRead more
Which element of scaling a network involves identifying the physical and logical topologies?
Answer: for the network scaling some of the elements are needed which are:
What do you know about network documentation?
Network documentation is like the technical documentation method. It is the process to manage the records for the computer’s network.it is necessary to provide the information about the administration and describe what the network may look like, determine and do the troubleshooting if necessary.
Network documentation elements:
The main goal of the network documentation is to help the network work smoothly as long as possible, lessen the downtime by doing the repairing where it is needed. The elements of the network documentation are listed in the following:
Notation helps the administration in the keynotes about the network administration basis, and the visual representation provides the support to administrator understand the relation between the equipments and the notation.
Some of the examples which need to be documented are listed in the following:
Which Two Statements Describe Static Routes? (Choose Two.)
Which two statements describe static routes? (Choose two.) Static routes are developed in the interface configuration mode. Static routes need manual reconfiguration to assist the changes in the network. Automatically it is the default gateway of the router. It is recognized in the routing table aloRead more
Which two statements describe static routes? (Choose two.)
Answer: The correct statement which is true about static routes is that: Static routes need manual reconfiguration to assist the changes in the network, and it is recognized in the routing table along with prefix S.
Static routing is the routing type that is defined as it uses the data from the manually configured rather than form the dynamic routing traffic. The manual entries in the routing table are filled by the network administrator but it is not the usual case. The static routes indicated from the name that it is fixed and has no effect even if the network is reconfigured or modified. Both dynamic and static routing is essential and use by the router to increase the efficiency and give the backup in case the dynamic routing is not able to do it. The static routing also gives the gateway, and use in subnetworks.
Uses of static routes:
The static routing is used in the following ways:
What Is A Function Of The Distribution Layer?
What is the function of the distribution layer? Connectivity for the high-speed backbone. In the wiring closets, it works by interconnecting the large-scale network. With the network user, it can provide network access. Fault isolation. Answer: The distribution layer acts by interacting in the accesRead more
What is the function of the distribution layer?
Answer: The distribution layer acts by interacting in the access and the core layer with the process of aggregation of an access layer connection in the wiring closets, giving the routing and switching, and applying the access policies with the rest of the network. The fault isolation and the high-speed backbone connectivity are the work of the core layer. The main goal of the access layer is to provide them access to the users.
Some of the distribution layer functionality is defined in the following:
Which Statement Describes A Characteristic Of Cisco Catalyst 2960 Switches?
Which statement describes a characteristic of Cisco Catalyst 2960 switches? The catalyst 2960 switches are mostly used for the distribution layer switches. New series of the Cisco Catalyst 2960-C assist the PoE pass-through. It is considered a modular switch. It is not in the favor of active SVI (swRead more
Which statement describes a characteristic of Cisco Catalyst 2960 switches?
Answer: The Cisco Catalyst 2960 switches are the favor of active SVI (switches virtual interface) along with the IOS version which is prior to 15. x. It is commonly used for the access layer switches and it is fixed-configuration switches.
Cisco catalyst 2960 switches are the fixed configuration switches that provide the faster ethernet and gigabit ethernet connection with the LAN services for the network of market and the office. They are present in two forms: one is cisco catalyst 2960 along with LAN base software while the other one is with LAN lite software.
The Cisco series with the LAN base software are models with Cisco catalyst 2960 and provide intelligent services such as branch offices or enterprise wiring closets. Moreover, this category of the Cisco switch supports the Qos (quality over services, network admission control, availability, and many other features.
The QoS helps in the network control and the optimization of the bandwidth, and the access of the control list (ACL). for the voice effect, video quality, and traffic it supports hardware-based multicast.it provides free software updates. the setup is easy and fast. The hardware warranty is not a lifetime but limited.
Some of the characteristics of the Cisco catalyst 2969 C series are:
What Two Tasks Do Dynamic Routing Protocols Perform? (Choose Two.)
What two tasks do dynamic routing protocols perform? (Choose two.) Hosts discovery. Manage and update the routing tales. Network discovery. IP address allocation. Propagation of the host default gateway. Answer: Management and the updating routing table, network discovery is the two tasks that areRead more
What two tasks do dynamic routing protocols perform? (Choose two.)
Answer: Management and the updating routing table, network discovery is the two tasks that are performed by the dynamic routing table.
Dynamic routing protocols
The dynamic routing protocol in the router exchanges the update on the network status with themselves continuously such as the broadcast or the multicast. Along with routing modification messages by protocols, the router can update the routing table if any change in the network topology happens ever.
Moreover, dynamic routing is the technique of the network which provides the routing optimal data. Dynamic routing uses various protocols and algorithms. The common is RIP (routing information protocol) and the OSPF (open shortest path first). the protocols of the dynamic routing permit the router to share the information with another router which helps them to select the best possible path. Some of the protocol’s examples are RIP, EIGRP (interior gateway routing protocol), and OSPF.
The routing protocol has three basic types which are discussed in the following:
Distance-vector Routing protocols:
This type of routing protocol uses the easiest algorithm which can calculate a cumulative distance between routers based on hop count. For example, RIPv1 and the IGRP.
Link state routing protocols:
It uses the most advanced algorithm which works to manage the difficult database of the internetwork topology. an example is OSPF and IS-IS (intermediate system to intermediate system).
Hybrid routing protocols:
It uses the combo of distance-vector and the link-state method which can incorporate the benefits and lessen the cons. an example is EIGRP and the RIPV2 (routing information protocols version 2)
See lessWhy Is Dhcp Preferred For Use On Large Networks?
Why is DHCP preferred for use on large networks? More IP address resolution requests are sent by the larger network for the domain. An authentic transport layer protocol is used by DHCP. Those files which are copyrighted should be kept restricted by DHCP. Using DHCP is effective for keeping IP addreRead more
Why is DHCP preferred for use on large networks?
Answer: The assignment of the static address requires manual staff addresses to configure each network host. it is easy for the larger network to change frequently and a larger number of hosts to configure regardless of the short network. Using DHCP is effective for keeping IP addresses rather than static addresses.
Dynamic host configuration protocol (DHCP) is a network protocol that operates on an IP network and the server of DHCP assigns the IP address and requires useful information to every host present on that network so that they can communicate with the endpoint with greater efficiency. Apart from the IP address, DHCP is capable to assign the subnet mask, default gateway, DNS, and many other parameters.
The DHCP components are listed in the following sections:
DHCP server:
A server is a device that contains all the useful information including IP address. it may be a router or nay device which works as a host.
DHCP client:
The client is the end where the configuration information is received from the server. It is either a mobile, laptop computer that is connected to the network.
IP address pool:
These are the addresses range that is present for the DHCP client and maintain in a sequence starting from low to high.
Subnet:
The IP addresses are divided into fragments called subnet which helps in the maintenance of the network.
Lease:
Lease is the time limit of the information which is in the control of the DHCP client, if it is expire then the client has to renew it.
DHCP relay:
It is the host which looks at the client messages which are broadcast on the network and sends them toward the server and vice versa.
See less