|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
) }( L5 ^0 ~0 lA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.; Q. q8 e4 G6 t) c; M$ m0 ~6 J
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command./ o9 M2 Z0 @7 L6 k
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
; {) O& A- g0 D7 L5 m0 oD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
/ e( e6 e7 n1 e- ~1 C/ Z# aAnswer: C0 H1 y5 N% G/ H' [3 |
Y/ j. v: Q& o5 r" a' S
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)1 r: X0 W% C* M" W
A. RAM
+ Q' \- ~6 W. T6 w8 }1 nB. NVRAM
. _6 ^: X9 m8 G6 B, k( X2 ]/ _; v) \C. flash memory/ x J% B9 O9 a7 Q5 v, b
D. HTTP server9 t) K, R0 ~ {, w+ N
E. TFTP server* }9 F( D4 h9 o# \
F. Telnet server& D, z) H$ W% v8 I
Answer: CE
6 ?; y3 |- n0 c# p8 F9 o* R9 I; D9 @" M0 O
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
( \9 h5 u& R0 S; ^A. 115.64.8.32
- T9 }9 B- ]2 C; {2 \9 gB. 115.64.7.64
" l# f [9 W- q0 e# b3 ^C. 115.64.6.255
% F5 Y T( j& y# ?/ vD. 115.64.3.255
5 _8 O; v" K1 x: zE. 115.64.5.128
4 }. J" V6 I2 h/ _3 P+ U% S& IF. 115.64.12.1280 x4 I- r8 o$ C
Answer: BCE2 u2 I6 x" f/ t6 D# v4 H) L
0 ^2 M7 ~" N, j% O0 v& n" i; V
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
5 V6 [$ L0 V5 V3 Z# hA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
& ]0 ~! r( }+ _3 Y, ^8 ?. G l; |B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.! n& t9 }# o/ Q. r% u
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
" `9 A( _$ L* @; JD. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
, N3 f9 X5 H( xE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.- v) \6 {( F1 J# G
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
8 S. @- E0 W) R/ NAnswer: ADE
9 n0 T3 c n9 l
7 l8 z, ^ F) D% }2 k, P3 j5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.), T# T. g! ]8 P/ x0 Z. v4 v4 \
A. It ensures that data will be forwarded by RouterB.+ X; s. b: w7 s. O7 i% t
B. It provides stability for the OSPF process on RouterB.
4 |$ l7 Y! G% e, f, @C. It specifies that the router ID for RouterB should be 10.0.0.1." R4 C- ?: W o: g2 e
D. It decreases the metric for routes that are advertised from RouterB.4 Y$ G; s3 J+ H; h+ P' ^
E. It indicates that RouterB should be elected the DR for the LAN.
' ?; j. x" k2 r* I, m3 U. uAnswer: BC+ v& n$ ?; ]6 L
$ Z; I! m. u1 S) c640-8021 A4 |" z7 {* W1 E
|
|