该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?' O6 ]. H1 a+ ^( W3 ?/ s
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.( k$ [+ s; B7 |5 ~( S
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.: P9 p- ]9 z& b& V. c0 }
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
5 `5 Q; L4 y# ~4 r2 V6 n) o: ?D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
7 [' W4 Y$ U4 R" KAnswer: C) R- v5 D: k& C! O
. F% w1 F I( E0 |0 Y! l2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)* L$ w6 j5 K# d! r+ h5 M
A. RAM& W% ]* i$ c1 u' U, I1 ]
B. NVRAM
, A6 }% d( P9 G& CC. flash memory% I; i2 q; ?; d/ R6 _
D. HTTP server7 p9 f9 y( V4 A3 O, H! K
E. TFTP server
" ]- }" G& d+ F, s" A0 B! ~) SF. Telnet server2 v! a6 s) C) J
Answer: CE
8 p' y* ]6 W1 e
: ^8 M$ y% u* K" j9 b) O3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
, N! j! q4 O' h. i! T' \0 K: PA. 115.64.8.32
! D6 K& [6 Q5 [! H( uB. 115.64.7.642 g ^1 }8 H5 c: j: H* z( p+ z
C. 115.64.6.255+ j# A, N9 ^' ]8 x" f" K
D. 115.64.3.255
2 v# I! N) h: n# _E. 115.64.5.128
- f* t$ v1 s% a& I. Q0 oF. 115.64.12.128
! C/ N! I; {; {. PAnswer: BCE
$ y% K- W" u/ M; {8 w: [3 {1 x* O' K5 [8 X d# \/ F1 R7 R, r
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
$ S" K& J. |& L3 Y0 GA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
9 Q2 _# G. \0 kB. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
9 N: p! ]3 J4 y) h$ gC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.: o8 ]) H+ C. _% z) x5 ^6 A+ S
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
; H* W+ ]# Z0 x' u1 z) Q% F; e+ x. _E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.3 a- G# t: w, w& @' }
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.. a; s: e, ~. I! W. H0 ?3 l
Answer: ADE
; D0 Z; V; R% C+ S# Y
& ]# l. _8 w3 x) S; Y( P/ j D' R$ Z$ K5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)) g* k! R4 ]: \: W: G: y" R+ G
A. It ensures that data will be forwarded by RouterB.- m5 x1 e" |* k) f3 c+ p) x
B. It provides stability for the OSPF process on RouterB.
" `. @' `" l v* K/ ?, cC. It specifies that the router ID for RouterB should be 10.0.0.1.
9 p4 A. h0 ]! L; `! YD. It decreases the metric for routes that are advertised from RouterB.
+ T% j/ x7 Z5 s. K+ nE. It indicates that RouterB should be elected the DR for the LAN. f4 |- d6 m6 F$ e! r& l% L9 L
Answer: BC( ~" J# L9 r- v* ^
# D9 P3 X* Y' Y4 s8 k2 Q- m640-8021 z& x( r" c" S* J
|
|