该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?* K. h' w$ }, F7 i- H
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
3 I1 ^) g, J4 GB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
+ H" Q3 H4 b0 @: ~C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.4 i0 o2 o! w* e* a1 A
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
3 a9 ?4 Q) O2 F' b. t. LAnswer: C
" }7 R( o/ F% y' A& ]( Q ?& e1 B. Z v$ Z
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)! y5 ?+ x" |. ]: Z* o) k- y6 f
A. RAM* z# D2 x" h* y# o; x' s7 Z; N
B. NVRAM
, C/ i; E9 s \ k* C J/ YC. flash memory
9 a8 ~6 F5 l& A' p4 ^! PD. HTTP server' \4 ^: w" R+ i3 _) a8 y* S
E. TFTP server
` x: |" O! q( eF. Telnet server0 c/ a' Q! q' `5 Z' r) D
Answer: CE
) |5 C/ z J; H) Q* H
. o K& K6 W7 h* k: M1 Q) F4 ], Y3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
$ ]2 k3 R* D X" mA. 115.64.8.329 R* D+ z2 H% m7 L D* i( D
B. 115.64.7.64
! Q- d' M4 r- w' L$ LC. 115.64.6.255' a, {/ D/ g, G: T! @/ m1 M
D. 115.64.3.255" c8 Q) K5 F7 w y" ^
E. 115.64.5.1289 U" h3 l9 l% i& Z& Q1 z
F. 115.64.12.1285 N/ r3 E8 j( O. b
Answer: BCE9 [0 D- y C% O0 U
% t. H3 ~" v' X! ?( x7 h
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
# i( l3 V, _6 k0 K8 l! LA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
6 v3 Z/ g; T3 R& x5 F& w, R* oB. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
$ h) l7 s8 \% |, iC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.% w( O6 {0 J; a4 T( M+ ~- L
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default." v3 F& F2 x. k7 K7 Z
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.
5 h4 X3 c8 D0 X- E+ i: Q% u8 GF. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.* x; e% n% q0 X7 H
Answer: ADE
- h8 |( T$ W) X' B- D6 r$ I9 p8 e4 E# k, Q$ Q" g
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)1 a$ [, e* K0 n3 @4 s! O
A. It ensures that data will be forwarded by RouterB.
2 L* i3 t# d$ }( s3 BB. It provides stability for the OSPF process on RouterB.
9 X7 [4 p9 D8 F4 h+ ~C. It specifies that the router ID for RouterB should be 10.0.0.1.
+ V/ o1 c8 ?/ RD. It decreases the metric for routes that are advertised from RouterB." A! e; Y, C" _1 `( j
E. It indicates that RouterB should be elected the DR for the LAN.: i' [1 @: F$ t$ }+ [/ f
Answer: BC
0 b; }+ r! M1 G; T# ?& R$ A3 P- _, X g. ?' y1 [
640-8020 r' j6 `/ {- j, f# i0 g
|
|