该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?! n4 W! O# n) W+ d
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.0 y3 j% Y" m( E7 L7 [2 v& c1 z; K
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.9 e# _% J# ~, C! [
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.1 I- X% x# j7 p' O8 Z& z- b/ {
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
2 I3 ?7 M. _3 `$ B2 rAnswer: C
5 f; L3 k) n, c' {. y; |! o! w, G+ b2 H
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)4 C/ ~, H) O7 K' l% o: o5 o" L$ k' Y
A. RAM
8 e8 s2 a- f" m% V/ oB. NVRAM
+ y; v( ^- U. t" ?C. flash memory5 L; P' D P5 E$ o* i# i1 ~! u
D. HTTP server& ^ u7 \7 i4 p5 I
E. TFTP server
: v, n8 W% b4 [% HF. Telnet server
- Y2 R" A; \" r7 c V' h. UAnswer: CE
8 r V# y0 l4 r6 ^7 t7 I% b& Q6 |% q( W2 S& E
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
% l. y5 u2 z! A. Y" |- @; B9 OA. 115.64.8.32
0 O$ J( I, j7 m& a1 AB. 115.64.7.64
1 Y4 s# O- m7 L `) E8 j; HC. 115.64.6.2552 _" d& n; P( A; r
D. 115.64.3.255
! j; h8 P3 B7 Z2 GE. 115.64.5.128% ] F% q3 B$ u3 B: _
F. 115.64.12.128
$ P: j d& ~, X+ }: Y/ EAnswer: BCE
9 k+ u0 {# Y( A. X
( q7 B) G( O6 D0 w. e# c* R) L4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
% D, b9 C0 a3 q/ ~$ o [! JA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.+ x4 v; \: k: A# ?/ Q
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
( H9 o. ~0 M, m% @8 H3 zC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default./ N' g5 c% \( K, w! X! W" w
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
$ G# A3 ]% S1 q3 W0 ]E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.. l1 F9 z1 J! A4 I3 l' C
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
+ @5 r! t9 U1 L2 \! [; @+ mAnswer: ADE: L8 x: ]1 Q& u+ S# R. ]
6 T6 j3 x( o8 s, Q3 B$ ~" W
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)
( M1 f5 o; q& GA. It ensures that data will be forwarded by RouterB.% P H' O2 B5 T' {+ C
B. It provides stability for the OSPF process on RouterB.
% r6 K0 ` E2 ~4 p( \ mC. It specifies that the router ID for RouterB should be 10.0.0.1.
4 V" Q( g! ^, b. lD. It decreases the metric for routes that are advertised from RouterB.
9 f! P5 k1 a" ~: \3 l4 i3 T4 {. [! QE. It indicates that RouterB should be elected the DR for the LAN.
6 S" w& Q5 K" A1 S+ OAnswer: BC8 K' _7 X1 B* L
/ ]) P& `" Q9 y8 o6 W" X640-802
9 Q) n/ f1 v7 x7 a |
|