|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
) a0 r4 `2 p$ d- { i6 bA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
& ]6 ~1 {2 E4 J# T8 V1 k+ j0 JB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
6 R K/ K% D S/ IC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.# L2 j+ F. F4 r
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
* g# F9 y' V. g$ k6 h6 B7 t) [Answer: C" S% P5 u# d) B6 U" k0 @. G
, u3 j) f3 o J/ q, x$ H- N2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)' c$ h/ @" E' {7 \
A. RAM/ `6 ?8 e) K1 l, Q/ E0 C8 j
B. NVRAM; \( l+ @2 c4 t% z
C. flash memory8 ]2 _+ U2 S* l& c3 K1 c
D. HTTP server
" X6 s0 d0 \& l4 K6 ?5 A/ O$ QE. TFTP server
! M/ u2 H# @5 X' o8 |/ s* hF. Telnet server
5 ^; r, A% O4 {9 Y. ~/ QAnswer: CE2 A- Z9 e8 f' Q' E' u T
6 L5 C/ m- p" v3 ^; Z3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
3 r4 h. k1 W3 P4 G. r# dA. 115.64.8.32' {9 ^# o* @7 Y6 `; f# `4 h
B. 115.64.7.64
6 b( ^7 Q6 q! s! [2 GC. 115.64.6.255
6 f9 H2 c5 u- ^$ `, X. @D. 115.64.3.2556 U! P: @) l& K$ Y4 d) q0 h
E. 115.64.5.128
0 n- d; W& D" OF. 115.64.12.128' O7 ^2 B( p# m M3 Q! S) \ ^0 Q
Answer: BCE
7 `3 Z% O2 \3 z7 v
% M3 V- L% b4 w# S6 w6 q* J4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.), I! n p' B8 p/ A- g
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
3 c2 L& z, R$ e; x) _B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
( _5 i0 R- S" E; Z$ o4 ~+ QC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
, {% z! b E5 p$ A0 h% r6 H6 o* XD. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
# y3 E+ H6 y( y- o: J9 i2 o5 pE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.7 O5 x0 D3 s3 R; U! Q# v, ~, g* I
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
2 R9 k6 y' h1 C8 N1 X( @% n* GAnswer: ADE6 v) ?( d3 p2 m* ~! [
# D- v2 u3 {+ `: T- ]9 r" k+ r
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)4 N8 m) r5 k6 R
A. It ensures that data will be forwarded by RouterB.6 Y) L0 c2 A% V7 ?, U
B. It provides stability for the OSPF process on RouterB., c* T$ v( n ], X3 K9 G
C. It specifies that the router ID for RouterB should be 10.0.0.1.
/ c& y' C# P _" p# N, a! \D. It decreases the metric for routes that are advertised from RouterB.' J/ ^6 M0 j- p3 G: b: J. ^
E. It indicates that RouterB should be elected the DR for the LAN.( ?7 a( E6 x. r1 `
Answer: BC( G! x; m0 @5 y$ p4 a4 V
4 p# t( ]: e+ Y/ m+ \
640-8024 ?6 Y. I$ n6 i5 |1 ]. ?" E
|
|