该用户从未签到
|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
4 D$ v' v \0 A0 w s, M# {2 }# bA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
. { F2 p! X& F9 y0 i: \B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.1 e9 `& S5 H6 a0 i) {) l5 c7 @8 A
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
" D- y' ~% `* w! y1 F2 oD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
& d. p$ U) ?" A' `! ]5 HAnswer: C N( K. j) w( C9 Q- _2 a6 A
( E% j: C2 C( P7 U% \2 k2 r
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
, Y D% P5 ]& G; mA. RAM
; ~5 t3 a# {/ s; vB. NVRAM
3 } V# k- _( gC. flash memory- Y0 x' g/ J" `4 ~
D. HTTP server
7 K- H7 p/ V2 `# e. Y8 ]& XE. TFTP server
' a1 p) A" S* s! IF. Telnet server: k+ H( f4 ~4 |( l
Answer: CE) z) F0 p+ a$ p9 g) z, I
2 a' _3 S! ^2 b7 g& H6 w8 W3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
$ W6 }; E2 i) c' e# SA. 115.64.8.325 j4 B5 J, x; K5 M
B. 115.64.7.64, ~$ @1 I+ m+ ~
C. 115.64.6.255* B/ I6 [+ L9 U' E# T$ `# X
D. 115.64.3.255- L0 l% p3 Z: c- } A
E. 115.64.5.1281 O, ?/ m% P1 p+ m* |
F. 115.64.12.128
8 v, J& B) M' j3 V4 Q' z9 }Answer: BCE" r6 `/ Z% w7 p* \# D3 o
% A/ h3 t0 g }: _9 w4 b4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)
) z! e i! t3 @4 ?( m& wA. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.9 Q0 `8 W; C2 B( n, q
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.
4 L# l+ ~' s; e" r% y* NC. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.
( _" M$ h% h9 UD. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.6 Q- f" S; l/ ]5 x' u
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.
- j$ Z- u3 R% N3 b6 H/ cF. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.2 F- e0 {8 h0 i! X$ P
Answer: ADE' R% ]* C3 W* N$ k/ P- p
( g0 e6 C! |, ?! M! H7 G1 L5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)/ f8 i8 A! V2 l
A. It ensures that data will be forwarded by RouterB.
' i( q" S# E- T' T5 p. b) G, Z2 aB. It provides stability for the OSPF process on RouterB., f# t% G* @2 U& D$ n
C. It specifies that the router ID for RouterB should be 10.0.0.1.
- _/ e# f& S5 T4 F+ Z1 E, mD. It decreases the metric for routes that are advertised from RouterB.
, q0 V; N4 \, j K; wE. It indicates that RouterB should be elected the DR for the LAN.8 \. g! c/ N( I7 j1 z
Answer: BC7 e/ K! j' y# T3 g" }
8 w! ^! c# e7 K6 E* Z
640-802
" p0 F1 @& E& z! c. T( _2 B4 p; s |
|