|
1. A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?+ H& i8 L3 q( c \ ?/ v4 N3 U
A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.- w. A1 @* }- i
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
; M0 v$ r# k1 j) O4 X) k& CC. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
: u' e) v5 C1 q y* C- pD. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.& y1 ~$ r/ R5 E) z7 `
Answer: C- R; ^9 u: t# F# q
- E& y- r2 j) c: K& i- b+ b2. Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.)4 y i( y4 B. } J
A. RAM2 e$ L# ^4 `+ B( G F0 P# L" u
B. NVRAM0 K6 h- M. j" w' ^ l
C. flash memory
/ }2 g1 I+ r# [2 iD. HTTP server
& F; E; M) l+ j7 X1 ]E. TFTP server/ [& q6 ]" @! ?2 C3 ^0 D f/ e
F. Telnet server8 n) H6 I; C. i2 u& Z0 x1 r
Answer: CE
/ U6 Z; ]1 B7 m2 E s/ H2 r* v: q8 m2 \' v. C2 u2 u6 H
3. Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
X0 M5 B8 Z4 l6 c& \) IA. 115.64.8.32
" Q2 t( j' Y9 y) s9 E4 v8 OB. 115.64.7.640 \' x+ a3 l7 y% ]7 F
C. 115.64.6.255$ Q! m# U+ K1 ~7 D# t
D. 115.64.3.255
3 s7 G/ S8 ^' @- r% q; Y( wE. 115.64.5.128- l( T2 |& E9 v s0 o$ { W
F. 115.64.12.128
1 a+ Y& F. J A# q8 X V, o9 K4 tAnswer: BCE
) J4 @* [4 R7 Q# i0 a: [. {& O& v6 ?. D3 h! T
4. Refer to the exhibit. Which three statements are true about how router JAX will choose a path to the 10.1.3.0/24 network when different routing protocols are configured? (Choose three.)+ `) p: x' U# q# I0 R3 K
A. By default, if RIPv2 is the routing protocol, only the path JAX-ORL will be installed into the routing table. f3 Y; \# p5 H% u8 m
B. The equal cost paths JAX-CHI-ORL and JAX- NY-ORL will be installed in the routing table if RIPv2 is the routing protocol.! N7 t, U$ V0 ~ o! m6 |
C. When EIGRP is the routing protocol, only the path JAX-ORL will be installed in the routing table by default.8 |; K0 N- R3 j# Q8 r* |
D. When EIGRP is the routing protocol, the equal cost paths JAX-CHI-ORL, and JAX-NY-ORL will be installed in the routing table by default.0 I3 t, o j9 }& A2 Y8 \% f
E. With EIGRP and OSPF both running on the network with their default configurations, the EIGRP paths will be installed in the routing table.8 Z- A. {$ U; d: i
F. The OSPF paths will be installed in the routing table, if EIGRP and OSPF are both running on the network with their default configurations.
0 i+ \5 w P( |, y ^Answer: ADE
# u/ }& d* \+ b$ i8 O: h2 e# k0 }4 c3 w% O9 j
5. Refer to the exhibit. Which two statements are true about the loopback address that is configured on RouterB? (Choose two.) ]2 m3 p- h% G" Q6 Q8 O% a
A. It ensures that data will be forwarded by RouterB.# S7 ~6 K8 Q1 s1 y/ v
B. It provides stability for the OSPF process on RouterB.' Y& l6 _& z9 P1 ~
C. It specifies that the router ID for RouterB should be 10.0.0.1.
. x3 f3 f5 h' r* JD. It decreases the metric for routes that are advertised from RouterB.
+ ], p9 J7 X9 S3 ZE. It indicates that RouterB should be elected the DR for the LAN. K( u4 Q7 |$ y+ y# Y- I3 ]1 d7 u4 F
Answer: BC3 }: M% H9 h' p) f& u
# [5 i% c$ s9 F/ H- V: \ m
640-802
( U, @ I- B5 I |
|