该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?% S% f, r# y& o" Z. v
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
$ g& [& C. q3 l' oB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
* o/ u5 P p( A) dC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them." i/ A& w3 M: j" h
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
5 ^; {4 s$ J. p) A$ a7 {Answer: C
& Y# w1 \& E7 U6 N3 q" r+ E; z5 l2 m& S$ X' U
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
7 U0 I2 T& h8 TA. RAM
% B2 m( L [, Q2 z" b$ N4 xB. NVRAM: u8 r$ {* b8 `" Q8 A( A
C. flash memory
# q0 a$ P8 [0 M8 V+ j& J/ |2 G- JD. HTTP server
' v2 p: r8 A/ A, |2 {E. TFTP server
1 L' Q6 L9 I& i& |8 M9 @: _) Z0 c2 q2 CF. Telnet server
2 O1 P: w. w" L7 |; j/ C0 uAnswer: CE
j( y( V5 `" }. E% n
! j, o0 \! V z5 n: |& o3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
1 A6 y* A; P" @8 m; a5 M7 u0 j4 ZA. 115.64.8.32/ S, O7 s& f- p) N
B. 115.64.7.64$ Y3 u& d r- ]9 U' k& ~* Y0 v
C. 115.64.6.255
( `: G/ `& u' k) S. p3 {D. 115.64.3.255
" `0 e' y6 H, L i' }$ Z PE. 115.64.5.1281 d: `1 p9 |& `9 C; \
F. 115.64.12.128
) q2 w4 D ^3 m* N' V2 ~# UAnswer: BCE
. c9 { l3 x- Y+ [, b/ l. Q% ?( Y0 f" X: n5 ^2 T$ {4 f
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)0 L/ H: [# r6 Y' j& _: }
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.' |& J9 _) N- B Q! |: z
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.8 v7 n9 U& b8 Z, u- I1 `) N
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
( K) F, D9 o" V6 ID. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
6 v7 x, X$ h% |+ [# vE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.
! [- R3 k+ }" UF. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
k/ y8 o/ R4 K* o$ l, w3 R" k5 cAnswer: ADE& [" q. e( Y' W. X, U9 k. ?
* U4 v6 N5 s5 K, a5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.), P6 n0 n4 o* Z* g
A. It ensures that data will be forwarded by RouterB.$ k7 o5 I T2 q4 l
B. It provides stability for the OSPF process on RouterB.: }: U3 }: t, t4 w( |- n
C. It specifies that the router ID for RouterB should be 10.0.0.1.
# a% e. r l; c" tD. It decreases the metric for routes that are advertised from RouterB.
6 o) c6 G' M. x1 {& `$ hE. It indicates that RouterB should be elected the DR for the LAN.
, ^3 G- b$ ?" W/ o4 B( oAnswer: BC$ B% M& I* s4 U3 y" w
5 C" W2 b6 B" e$ u Q
640-802
" ` T4 I, w9 u5 F4 _$ x; c |
|