该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports? A% x: A/ h1 {% x
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.) |, u8 f' b/ D7 \
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
+ V: I! V& Q# M2 FC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.1 M& V4 `+ j( e1 O' o, c
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
5 H5 O) F) H. h2 f! O8 |Answer: C; J# M0 `! t% |5 f- d3 I2 I! T
# X. F" a9 S! j7 W" D: [2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
9 w$ c# O2 h* r ^A. RAM
3 O- B$ F1 D" H6 ]& v1 X9 v2 X2 N' HB. NVRAM
6 _+ K: A! i3 b5 @, r% v& V- s4 oC. flash memory
4 [# I, T5 @2 y3 z: t; I, O x1 ZD. HTTP server! @! `2 }- {" k9 u+ @8 W' y
E. TFTP server
- }# h5 {' u' B9 V' E: A. C3 o! ZF. Telnet server
; b. j/ I! ~/ }* x* s+ V0 kAnswer: CE
& I- I- P: d; s$ ]# t' t3 b6 y6 `0 d3 X6 c
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
% o; Z8 V, \+ w' j+ y1 fA. 115.64.8.32% a+ S/ ?; H) P5 S
B. 115.64.7.647 l. S) g# C6 c6 ^
C. 115.64.6.255. {6 g' r7 c, `$ z: B# K
D. 115.64.3.2553 B) d. \$ r( ?) f; u7 E& i0 ^
E. 115.64.5.128
3 V0 n# `, d) ?" ^ U9 ]F. 115.64.12.1288 s0 z! B2 C% y4 c
Answer: BCE
5 H" B6 B& t. o3 _9 E5 d$ m0 h4 [1 `8 s5 k/ t: Z
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)- z6 E# @ H- d$ F% ]# S. G2 m; [4 a
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
# L/ o2 |+ T e7 [; R; ~B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.' Q+ ^) W1 h4 l3 y1 h' f, T$ n
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
2 x1 j. l& e8 \D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
0 C7 O" B, \7 H: {" FE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.- o$ T% g; l8 d- b* o5 O6 l
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.& }! c; [0 P8 W% A# S- ], k
Answer: ADE, E2 Q) p, Q) J" e1 a0 j7 G* p
' e% l1 T& i- ~: w& L* O3 b; f) c
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
( A' V6 Y8 g4 t. FA. It ensures that data will be forwarded by RouterB.
3 S" C5 g- p4 U/ t, vB. It provides stability for the OSPF process on RouterB.- K' V% H8 Y& ^3 _6 w
C. It specifies that the router ID for RouterB should be 10.0.0.1., q2 C: B7 p! ?% v
D. It decreases the metric for routes that are advertised from RouterB.- P8 U1 L; m, {
E. It indicates that RouterB should be elected the DR for the LAN.
& I7 e# W: L% J5 ?) A, V PAnswer: BC8 @$ _* m6 {# _9 \9 Z$ G, Y8 a! R
0 S; E- n. m4 `
640-8021 h9 K' d. w* q
|
|