|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?
; g) C# x' V) S( Z+ `5 XA. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
/ e/ [0 O8 l3 g2 n$ J. i$ h- X2 |B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
* e! R) G3 } c$ n4 y/ \0 yC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
% d' d6 b) ]9 kD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
. R& |. k6 l% }Answer: C/ X; r$ \. [: A4 L }+ ?) K
; u/ d! u+ U; B9 i! _
2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)
( U& L; Q, g7 X' DA. RAM
5 {, d% e3 g. J xB. NVRAM0 U5 h- P: y5 C5 G
C. flash memory( ]4 E+ U4 O4 p* F
D. HTTP server
; M# V% S. @8 e$ N& g, jE. TFTP server0 c6 H2 F, U) }& m
F. Telnet server9 e# J0 M2 Q: f0 S2 {3 F6 f
Answer: CE3 G/ z: x: h R- ^# H" N* q
+ m! K! P! N- U/ U3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
' W( D" A& q9 g' ^A. 115.64.8.32* @, K3 W% i! [" y( c! Z! z- q7 \
B. 115.64.7.64
6 m( t; C$ T# `( Y* wC. 115.64.6.255
; k+ i0 E% e$ M8 p3 J5 i7 A& _D. 115.64.3.2552 X/ w" r3 j7 a) _, q
E. 115.64.5.128' R$ W4 b' c! K+ P; a5 E9 ?& P
F. 115.64.12.128
9 j: u) A: ]$ E& `0 W/ ]% sAnswer: BCE, P' M1 Z* U8 E; d. q7 b
6 y" h6 ]- }3 D8 S# E% e. m4 X
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.), r( [$ N# q7 _0 S0 `5 ~: d
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table.2 |% \3 V8 U# _1 H0 m7 F
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.: \5 c3 y0 D) d! m3 r/ P( V
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.6 m9 `9 r6 B" t& S9 H! g6 S Q5 h. m
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.
; R5 f y. {) K4 ?. jE. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.
8 `6 ?9 s9 O3 i; H8 i4 |+ pF. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
$ s7 J9 P. x' hAnswer: ADE
l% Z6 ]% w4 K0 {7 N* T: d7 V6 H) m" w: h
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.)2 ~% I/ e- t2 n0 t* [. g
A. It ensures that data will be forwarded by RouterB.
}1 C$ z% q' _- kB. It provides stability for the OSPF process on RouterB.
5 c& e2 ^! H" R" G! lC. It specifies that the router ID for RouterB should be 10.0.0.1./ F: m2 A+ y |, A" @
D. It decreases the metric for routes that are advertised from RouterB.
, m4 b9 M2 b& |( G+ B; h- j* HE. It indicates that RouterB should be elected the DR for the LAN.
7 U0 [7 Z5 o. T i9 Z, ~5 `" S; QAnswer: BC
" G$ L( z% b4 R" @# {! c& m
+ k/ j# e: v* i$ w- O640-802
/ d8 o9 s8 ^# K& i9 E( M5 c |
|