1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeka94
3 years ago
5

Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?

Computers and Technology
2 answers:
Svet_ta [14]3 years ago
8 0

At least one device needs to be assigned to a Vlan 99 to bring the protocol up. Assuming that the Status is UP and the protocol is DOWN may mean that there are no ports assigned to Vlan 99 and thus no host assigned to this Vlan.






Blizzard [7]3 years ago
6 0

Answer and explanation:

The protocol of a management interface with VLAN 99 could be "down" because there are no ports assigned to it, meaning there are no hosts assigned to that interface. In this case, the status of the interface can be displayed as "up" regardless of the protocol.

You might be interested in
To create a button that will allow a user to send the form data to the server you use a type of ____
zysi [14]
Submit command, as it hands in the data to the server
4 0
3 years ago
The act of using computer equipment to “break into” the computer systems of others?
zlopas [31]

Answer:

Hacking.

Explanation:

Breaking into other systems sounds like hacking.

3 0
2 years ago
How does a firewall provide network security
ehidna [41]
Firewalls are connected with a network device which blocks untrusted network forming a barrier in between trusted and un-trusted network.
8 0
3 years ago
Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-fac
Katen [24]

Answer:

Option (C) is the correct answer of this question.

Explanation:

Smart card is the security administrator wishes to implement two-factor authentication to improve security.Normally this data is affiliated with either meaning, information, or both, and will be stored and transmitted within the chip of the card.A smart card, usually a Chip Card type.

  • It is a flexible card that holds an integral computer chip that preserves and sends a signal data, either database or semiconductor form.
  • Used for controlling access to a resource.
  • Data authentication, encryption, cloud storage, and software processing can be established by smart cards.

Other options are incorrect.

4 0
3 years ago
FTP is commonly used to __________ and __________ files to a server.
Aleks [24]

Answer:

upload; download

Explanation:

FTP (File Transfer Protocol) is an internet protocol used to upload and download a file to a server, there are some programs help us to transfer this data to a server, in some cases, we're going to need these programs to upload website files to the server like images or videos, or some websites where do you need a user and passwords to upload file by FTP

8 0
3 years ago
Other questions:
  • If you purchase a software suite for personal use, you can install the software how many times on how many different machines?
    6·1 answer
  • What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?
    8·1 answer
  • The essence of strategy is ____, so competitive advantage is often gained when an organization tries a strategy that no one has
    15·1 answer
  • on average, someone with a bachelor’s degree is estimated to earn _______ times more than someone with a high school diploma
    13·1 answer
  • Which of the following function headings arevalid? If they are invalid, explain why.
    12·1 answer
  • What linux command is used to change file permissions?
    10·1 answer
  • Why is the most important factor for investors always the quality of the venture's leadership team
    12·1 answer
  • 5. An entrepreneur who continues to find new and better ways of doing things is ____.
    10·1 answer
  • The NVCC college professor receives frequent emails disguised as official business emails. They may be requests to reset a passw
    10·2 answers
  • Que relacion tiene Las palabras: fermentacion-vino y clonacion- dolly​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!