该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?0 ~# t( Y3 E6 U% X8 s
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command./ p2 \/ q7 w" H
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
8 t$ g3 ^/ y+ R/ \2 H& {C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them." M/ |+ G. W1 R0 V Z+ ?1 z6 r, q
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
( K! ?, d/ i- [5 J2 d6 YAnswer: C1 ?9 \( m+ R, a. h- F# h7 X+ E
* i9 O6 Z+ c1 v* q1 T9 I2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.); R2 M4 D0 m4 b {2 s
A. RAM/ N$ j$ D" u) P2 z$ j4 ~5 j; ]
B. NVRAM! _' N2 w! s1 Y3 k$ B
C. flash memory
* m: N" L" N. C4 _5 i) KD. HTTP server& p( G* S7 ~9 j7 ]
E. TFTP server
( V( I. G& _' b; aF. Telnet server
2 r1 H' [& P+ R$ C) t gAnswer: CE A9 h; ~: K. _% {: ~
. C, |( J- ]6 ~) S# [7 A3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
1 Q; V/ [/ T- @: [- ^A. 115.64.8.32" O* k# q/ y: y+ o% |$ q! ? y& L( j
B. 115.64.7.64
0 o& T0 ^0 t6 T1 M" x vC. 115.64.6.255
' I* E5 }( n' L" X7 C$ J9 oD. 115.64.3.255* X: Z- D' O, w1 `" k- z! m& x
E. 115.64.5.128
( j) K7 F g) u i, H: yF. 115.64.12.128
* m3 P) j* W" b7 g1 TAnswer: BCE
% O( Y! _3 h; [' a5 d
: Z8 c" z8 e e ]" I+ j) |; m ?4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)9 M4 H& v5 g6 ]2 M3 ?3 j
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
- I$ ]- r# n7 w, i1 gB. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.4 b9 _9 S3 g' w O2 Q7 u
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
% V7 ?: ^1 o* G/ I0 g# i! pD. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
/ s% G; M% P9 [1 j1 e5 TE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.
# i& m0 Z% Y% L$ d5 Z. Z1 lF. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.; N8 t( j- b, d) ~7 }. d6 u% K
Answer: ADE/ g2 C! H; M# O1 M
) M, F7 y% u. i' y% w
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)/ m; Y' p1 y8 w
A. It ensures that data will be forwarded by RouterB.
/ M" g& J/ E" {2 d/ P4 ]( AB. It provides stability for the OSPF process on RouterB.
! F3 _ m' v/ e1 j: x+ uC. It specifies that the router ID for RouterB should be 10.0.0.1.
) H; {+ S* p, M/ K# ^D. It decreases the metric for routes that are advertised from RouterB.
. p6 F* v2 y% i2 U& ], jE. It indicates that RouterB should be elected the DR for the LAN.8 V% D8 ~, h" m3 u. Y
Answer: BC
. _# p: H( }3 A8 R
) e. ^) q9 b! Q5 e# }640-802* E+ p$ d( F0 _/ t: j
|
|