该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
+ M8 O8 j' P( B2 hA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
5 ]& J0 |; x$ ?/ u" a- w8 vB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
7 U2 ~ @; w. P3 z1 v$ \# oC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
5 W: ] ` u/ |# eD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.) q& [( n9 V U% J9 a- E; v! s
Answer: C
, z( o# U) P4 G4 R W3 j! t* E7 v' U; ~% u5 H- N
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)4 d7 G# N+ y7 k/ K( o
A. RAM- a" h- M* ^7 k& Y+ n5 m2 k
B. NVRAM8 Z0 Q# Y& m) P2 p
C. flash memory; S4 V/ l2 W5 _4 d: F/ I
D. HTTP server, x1 ?, N7 i& u+ f" N% x8 m
E. TFTP server
6 V, G/ f8 n" j/ W1 ?( | sF. Telnet server, T' A# M' O$ x% v- Z
Answer: CE/ Z2 \. M/ c2 j9 L+ Z, v
7 @7 [( M7 x8 U: O
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)( E4 u o) A& B& M
A. 115.64.8.321 Z- A2 O3 u9 k, W
B. 115.64.7.64
/ Y; L& U% B! d M# a4 x6 J8 Y$ ^ jC. 115.64.6.2557 w: ?8 \; J) E- g
D. 115.64.3.2552 N& v4 H2 e5 f. M
E. 115.64.5.1284 v+ r1 x4 j8 W1 F- X( t5 T6 J5 ^6 G# b
F. 115.64.12.128
8 j+ {% r: b+ v5 l" nAnswer: BCE& n+ \4 `! _6 X4 z' G
- K' y% D, _ Q; E Q1 W4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)! m9 x$ Q9 Q) _; j: V- F. \5 w( ~
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
- |- |3 x0 U1 l: HB. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.0 r4 U+ k& U. o9 B! B" h6 K y
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.8 y; ^+ |# K4 q! R( F* B
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
, p! R s0 G U3 w+ v; JE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.. B% f" d; W) l' I {
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
. x ]# V; P: \; [; [' E4 gAnswer: ADE& E( r; B/ b5 Q9 l- M6 V
; n) P( b8 y9 ~9 ~
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.). q" j: y1 ]6 N
A. It ensures that data will be forwarded by RouterB.7 s+ n( d) `0 p5 I3 J" S, d0 O
B. It provides stability for the OSPF process on RouterB.% | j* @( w T7 g. J" O+ v
C. It specifies that the router ID for RouterB should be 10.0.0.1.
' E' T6 j$ ]7 i* _( X% _* ZD. It decreases the metric for routes that are advertised from RouterB.
, b/ e: k7 o- s" lE. It indicates that RouterB should be elected the DR for the LAN.7 b: G9 ?+ S, S* U! z2 m3 u% n9 Z
Answer: BC
' N" K9 ]1 K, h# V/ j3 M7 n' b1 \2 O: M# i% m
640-802
' m- F2 P) R: N4 f$ T1 o0 B' O3 e |
|