该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
8 w3 C6 ^! ]. V4 @( m$ GA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
% q& f; t5 s; X7 P3 K, q0 [; `B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
) M" J2 O, T; _) dC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.+ y/ x+ Q6 n$ S
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
1 ^ D4 S2 \5 e; {: s; T x" MAnswer: C
3 f; B) x$ _) b( W2 B: F
3 L# M7 p4 w! P3 W/ O- b5 ^$ j0 S! o2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)3 j8 ?9 v: c& `9 D; N p
A. RAM' u6 Y7 d* v8 E, R, C* B
B. NVRAM; E* P! F& \% h: a r( v
C. flash memory
T8 n' d: r' s' H- Y1 ?' ND. HTTP server
X' `- s# v9 uE. TFTP server
; O9 V& n3 c# w; n- b3 t+ AF. Telnet server, A/ [$ ]. q. a0 W
Answer: CE
" r; {4 p4 p( m5 V; U- i9 w+ r( a9 `$ d( G7 r' | v. I
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)7 ?" E- B6 \9 n! r: ~
A. 115.64.8.32
+ A9 U; r$ B: u; dB. 115.64.7.646 c8 E: }& x4 V' F- E
C. 115.64.6.255- A7 ^" d: ^% E4 Z' E
D. 115.64.3.255% H! u* A0 A; I& F: [' Z( }% Y
E. 115.64.5.128
6 j& T z8 J) n) \F. 115.64.12.128
( i' W$ ]4 I9 t2 V7 oAnswer: BCE
5 f% r5 `: d3 n# p. @# ~4 q/ x
+ |4 J- A" \) u$ Q; c4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)0 _+ |6 J) b! _' M" ]& y6 _- L
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
: B, Z' O8 u) o/ A4 r0 ZB. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.( H% q. E/ u) T& M; Y4 {* c
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.7 D6 P6 z& o+ \1 j9 ^7 e0 ~6 O' c
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
7 H3 L: `9 u2 y! D' Y t8 XE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.% m6 m# u+ z8 n; t
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
! D" c& Z5 H; K" z; }Answer: ADE
! M, J& Q' \: p; ~* [
% S& V; _ K" H' M5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)' I u ?+ y8 x1 d9 P c h- M3 l
A. It ensures that data will be forwarded by RouterB.
; \; M. a+ P$ j7 F6 XB. It provides stability for the OSPF process on RouterB.* `- X4 E! B& L- W' n, Q+ x
C. It specifies that the router ID for RouterB should be 10.0.0.1." B2 h1 I, o1 J
D. It decreases the metric for routes that are advertised from RouterB.
, V* t3 y1 V( s& J a( k& h2 R, s' kE. It indicates that RouterB should be elected the DR for the LAN.
/ f3 t" g `7 p8 I; fAnswer: BC% G: c' {0 k' s
) S0 i7 ^; w% Q7 {) O0 r5 o5 u: I4 v
640-802
: _' [. c& u8 C' r |
|