该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?8 C$ W1 [# o X7 j9 N6 u1 A7 ]
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.1 l U% q* S$ t c9 Y, b/ ^* B+ ~
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.1 ]) T+ L4 {/ G
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
' e7 i; k# k! G; j( kD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security. t/ K% j, e+ @6 a; s
Answer: C/ s' Y1 B( {& \4 |$ r
; \' x* h9 z% F7 e$ f" h2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
9 o1 @7 `* e7 d+ rA. RAM: X; R! |- h) L6 F' ?/ I& i% g
B. NVRAM
0 a. |3 l" _9 P* I& i# s. nC. flash memory% Q7 G! B% @0 t& R. b* q) \! k
D. HTTP server; {) Y6 n. X$ E! `' b5 A. T3 k2 a% ?, X( y
E. TFTP server d+ J5 I, `' S5 s* @" \- I
F. Telnet server* A, k, O3 R c, F. H% K
Answer: CE4 \. W1 o' F; J' H0 D3 \0 ]1 \% W
" k t9 s7 O, j* G2 L0 S3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)! S9 \, V' S# @
A. 115.64.8.32( n$ U7 |: j; [# P
B. 115.64.7.64
; K0 n& F! k. b6 g$ c+ u6 W/ IC. 115.64.6.255
' b" d2 c9 a- l: m: g8 ?& YD. 115.64.3.255+ G0 z% ^3 J9 X& [
E. 115.64.5.128
S/ f/ d; p' s) ?& wF. 115.64.12.128
0 j: Y% g: A& y+ YAnswer: BCE
7 Q0 u; ?) O' \% s" \0 L- M6 T5 E9 b7 D1 G% h3 T
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)) Q( d7 B( g/ o+ X
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.' _, L" H9 ^4 Z/ n, U
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.0 ^; s& J3 }8 P8 k) G5 H: [3 {) `
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
) r4 U6 ?3 E( TD. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
+ P# @0 ]9 B, w% g- LE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.( D' X- V2 p" Y: o6 F6 A
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
! o/ k/ M' x$ `# O+ KAnswer: ADE
9 x/ i+ ?8 S1 ~- l% |* u+ P8 V" \8 o& n( k
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
" g2 t! S ?0 n9 X& B' f1 X0 NA. It ensures that data will be forwarded by RouterB./ d3 _/ N, H8 a' ?" Z0 a, E
B. It provides stability for the OSPF process on RouterB.
0 X% r7 u" E& q, e# K$ X( J6 sC. It specifies that the router ID for RouterB should be 10.0.0.1.
5 `! U r/ V' O& }. b. ]D. It decreases the metric for routes that are advertised from RouterB.
+ D' B2 Z% ^% J2 E3 a! s/ fE. It indicates that RouterB should be elected the DR for the LAN.+ c& \5 ^6 I+ o7 b0 d/ ^
Answer: BC4 W* a6 [1 `- b: \0 L+ v5 M& v. `
2 j' b I$ Q( r
640-802
6 q3 ?8 z$ b% Y* D" t4 ] |
|