|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?9 K1 X$ k5 L' D
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
7 Y5 f& ^4 N, P: nB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.0 G* A/ C- f6 ^ X7 p& M2 S
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.% M/ H( ~/ z) {4 H7 c
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.0 ?8 j4 L+ J4 j4 O" D. V3 Y
Answer: C T1 W5 {6 @ f/ Z- T, t
) l; ?$ E' m% ?1 ~ v+ C: G/ Q
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)- q" R. X, H* T, W9 y. G
A. RAM
- ?3 `3 s2 I# _ N {8 h$ }3 d" }B. NVRAM
" S" l' C4 G6 D( g# j5 {- CC. flash memory1 [8 E6 P( ?& W# s
D. HTTP server
; s& S6 M/ I# p1 ]& r% ~& iE. TFTP server
' v( G1 t0 A/ q/ ^ XF. Telnet server
" B) N; K+ g/ k _; D: wAnswer: CE5 r F# J$ Q/ Y8 b$ X3 ^
. I* C2 f0 t. c' O% f3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
7 M, S# O6 ]; B6 p8 A( u" N6 \2 ?A. 115.64.8.32) P8 L" z6 C3 d
B. 115.64.7.64/ K& p7 w! Y, c/ c
C. 115.64.6.2555 h5 B9 `- d, y2 S1 g" a
D. 115.64.3.255
; M+ g, w1 C9 I# }% J. d) b& S; Q7 QE. 115.64.5.128
& j* e+ z+ ]% {6 Y( [F. 115.64.12.128
$ Z5 x- X. Y8 C. x2 SAnswer: BCE
' R5 t2 e: o \0 Y
`/ G4 o9 G/ `+ K! Q$ W4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
% Y% T) `, k4 @, ^A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.+ J. @7 ]5 \, u# V
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol., f/ U9 k4 H' D8 F
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.- H6 t' x! g( t( D5 I3 Q Y1 r
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default. e# U3 K% ?: H; U- I" G8 n. d6 s
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.$ P: K) n; A5 j
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
- {) W5 T4 a- q* l0 T F. YAnswer: ADE
2 ~/ w! x* F% J" }( X8 C1 t. _3 C
1 _* m. h4 d2 m8 v! h7 \5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)1 i8 y1 e' `. p& ]. _1 p3 m
A. It ensures that data will be forwarded by RouterB.
6 i6 R1 o5 j9 D* uB. It provides stability for the OSPF process on RouterB.
" e7 ]. g9 q# ?- e3 Q( r9 k nC. It specifies that the router ID for RouterB should be 10.0.0.1.
$ H: ~& v# ^' g9 _ ]/ [D. It decreases the metric for routes that are advertised from RouterB.
, h' y$ A' B7 Z+ V* rE. It indicates that RouterB should be elected the DR for the LAN.
' v) }8 s9 N/ X! ^5 aAnswer: BC1 c& o0 H/ ~9 {( F/ G6 b# }1 X9 M
" G0 M+ N2 n6 ~1 v+ e( b- n6 _640-802
* G1 L' R0 U A4 ~& ` |
|