|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
9 r% m/ B4 ?/ y6 y h; wA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
' m1 h: R& D/ e6 N% e2 PB. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
6 z- A9 X! `8 u0 |6 m( wC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
( V+ }5 o ?4 D9 H5 Q/ FD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
1 y( x4 T" S4 |( I8 n7 |7 T& R( NAnswer: C
: Z3 H! v' j7 v$ `! p |& ]- G' N8 D3 s* ~
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
& i1 ^+ g) R$ z, o4 z) xA. RAM. c$ p$ Z! o2 r5 h$ O! Z2 n' Z+ m
B. NVRAM
+ ~: Y$ b% b( Q7 q6 s/ E' {$ wC. flash memory
8 b/ V: U9 g3 _4 x( ED. HTTP server
3 z6 Z8 g# E( T3 o/ B2 tE. TFTP server
/ H6 Z) f- _% w8 EF. Telnet server
, s# d' }$ _% X z" @ M7 `Answer: CE$ B0 E2 c- I/ Y+ D; ^
+ @) t& X5 R& h1 I f
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)" Y! m1 g/ @9 t/ c( T
A. 115.64.8.32
% B3 c# y6 q1 F, Y, sB. 115.64.7.64
: N6 t1 a. x+ O( l8 W( _+ LC. 115.64.6.2555 k3 g3 W3 Q5 {' J8 q9 @
D. 115.64.3.255
# g% [6 C& g2 EE. 115.64.5.128/ j7 z" N+ r/ X& @2 y$ k# G( {
F. 115.64.12.128
- U' O* V. E s# Y# ^Answer: BCE+ f3 u5 S5 Y, `) X4 _
% m6 p! L3 Q5 ]: ? `) Y+ i4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
* W$ r6 j# w' P8 pA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.
( r8 c& o1 l% m( j4 @B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
5 l9 n/ Y4 G7 G3 B5 Z6 W8 u. i0 a; rC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
( B. r! v J# }* _D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.: P. h P5 Y8 x
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.- v3 g6 c5 w- H) j: P6 |$ `9 s
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.. o: Q7 H% d9 r; u2 F" z0 F
Answer: ADE) l3 b" @; Z% z/ `( Q, Y
5 m& ]3 b' B2 i- ~8 K. G' G: v
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)1 L- A; z6 t% Q6 Y9 r+ f
A. It ensures that data will be forwarded by RouterB.* s; d, c z4 p7 J3 P% m
B. It provides stability for the OSPF process on RouterB.
( f' e5 G/ y$ J/ n5 ?C. It specifies that the router ID for RouterB should be 10.0.0.1.7 H4 m5 o4 _" M4 W
D. It decreases the metric for routes that are advertised from RouterB.+ a" C3 i6 R; U. ~- ]
E. It indicates that RouterB should be elected the DR for the LAN.; p$ N4 g1 k0 u* R( d6 g
Answer: BC
b9 J! b/ K# p4 D+ d! s0 m4 G2 j7 X* Z1 t# T( L
640-8021 k0 K( p) K. g% I w2 Y# R0 |' U' ~
|
|