网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

  • A、Port security needs to be globally enabled.
  • B、Port security needs to be enabled on the interface.
  • C、Port security needs to be configured to shut down the interface in the event of a violation.
  • D、Port security needs to be configured to allow only one learned MAC address.
  • E、Port security interface counters need to be cleared before using the show command.
  • F、The port security configuration needs to be saved to NVRAM before it can become active.

参考答案

更多 “Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()A、Port security needs to be globally enabled.B、Port security needs to be enabled on the interface.C、Port security needs to be configured to shut down the interface in the event of a violation.D、Port security needs to be configured to allow only one learned MAC address.E、Port security interface counters need to be cleared before using the show command.F、The port security configuration needs to be saved to NVRAM before it can become active.” 相关考题
考题 Refer to the exhibit. Which of the following statements is true? () A. BGP NSF awareness is enabledB. SSO for BGP NSF capability is enabledC. BGP graceful restart awareness is enabledD. 10.11.1.187 is configured as an NSF-capable BGP neighbor

考题 Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

考题 Refer to the exhibit. What additional commands should be used to configure OSPF area 5 as a Totally Stubby area? () A. area 0 stub o n routers R4 and R5B. area 5 stub on routers R4 and R5C. area 5 stub no - summary on routers R4 and R5D. area 0 stub no - summary on router R4 and area 5 stub no - summary on router R5E. area 5 stub no - summary on router R4 and area 5 stub on router R5

考题 Refer to the exhibit. What must be done on router RTA to ensure that EIGRP works effectively in a Frame Relay multipoint environment?() A. Issue the command bandwidth 224 on the physical interface.B. Issue the command bandwidth 56 on the physical interface.C. Issue the command bandwidth 224 on each subinterface.D. Issue the command bandwidth 56 on each subinterface.

考题 Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()A. Dual StackB. NAT - PTC. 6to4 tunnelD. GRE tunnelE. ISATAP tunnel

考题 Refer to the exhibit. Which command would verify if PBR reacts to packets sourced from 172.16.0.0/16?() A. show ip routeB. show policy - mapC. show access - listsD. show route - map

考题 Refer to the exhibit. Examine the partial configuration and the routing table excerpt. Which routes would be redistributed into OSPF area 1?() A. 10.10.10.16/28 onlyB. 10.10.10.16/28 and 10.10.10.64/26C. 10.10.10.16/28, 10.10.10.64/26, and 172.16.10.0/24D. 10.10.10.64/26 only

考题 Refer to the exhibit. Examine the partial configuration and the routing table excerpt. Which routes would be redistributed into OSPF area 1? () A. 10.10.10.16/28 onlyB. 10.10.10.16/28 and 10.10.10.64/26C. 10.10.10.16/28, 10.10.10 .64/26, and 172.16.10.0/24D. 10.10.10.64/26 only

考题 Refer to the exhibit. Which th ree commands should be used on router B1 to redistribute the EIGRP AS 10 routes into RIP?() A. router ripB. router eigrp 10C. redistribute eigrp 10D. redistribute ripE. default - metric 10000 100 255 1 1500F. default - metric 5

考题 Refer to the exhibit. Based on this command output, what can we conclude about R3?() A. R3 is an ABR.B. R3 is not connec ted to the backbone.C. R3 has four neighbors.D. R3 is the DR for area 2.

考题 Refer to the exhibit. A Boston company bought th e assets of a New York company and is trying to route traffic between the two data networks using EIGRP. The show command output shows that traffic will not flow between the networks. As a network consultant, you were asked to modify the configuration a nd certify the interoperability of the two networks. For traffic to flow from subnet 172.16.8.0/24 to the 172.16.16.0/24 subnet, which configuration change do you recommend?()A. Turn off autosummarization on routers N1 and B1.B. Add IP summary addre sses to the Internet - pointing interfaces of routers N1 and B1.C. Turn off autosummarization on routers N2 and B2.D. Add wildcard masks to the network commands on routers N2 and B2.

考题 Refer to the parti al configurations in the exhibit. What address is utilized for DR and BDR identification on Router1?() A. the serial 1/1 addressB. the serial 2/0 addressC. a randomly generated internal addressD. the configured router - id address

考题 Refer to the exhibit. What is the most appropriate summarization for these routes?() A.10.0.0.0/21B.10.0.0.0/22C.10.0.0.0/23D.10.0.0.0/24

考题 Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

考题 Refer to the exhibit. Which value will be configured for Default Gateway of the Local Area Connection?() A.10.0.0.0B.10.0.0.254C.192.223.129.0D.192.223.129.254

考题 Refer to the exhibit.   What are three of the basic components of a VoIP network?()A、software voice applicationsB、multipoint control unit (MCU)  C、gatekeeper  D、call agentE、interactive voice response (IVR) systems  F、softphones

考题 Refer to the exhibit. What does the option secret 5 in the username global configuration mode commandindicate about the enable secret password?()A、It is hashed using SHAB、It is encrypted using DH group 5C、It is hashed using MD5D、It is encrypted via the service password-encryption commandE、It is hashed using a proprietary Cisco hashing algorithmF、It is encrypted using a proprietary Cisco encryption algorithm

考题 Refer to the exhibit. What is the configuration an example of?()A、enabling modular QoS over Frame RelayB、enabling Real-Time Transport Protocol (RTP) header compressionC、enabling distributed compressed Transmission Control ProtocolD、enabling latency and jitter reduction for Transmission Control trafficE、enabling TCP header compression

考题 单选题Refer to the exhibit. Given the output for this command, if the router ID has not been manually set, what router ID will OSPF use for this RouterD?()A 10.1.1.2B 10.154.154.1C 172.16.5.1D 192.168.5.3

考题 单选题Refer to the exhibit. What is the configuration an example of?()A enabling modular QoS over Frame RelayB enabling Real-Time Transport Protocol (RTP) header compressionC enabling distributed compressed Transmission Control ProtocolD enabling latency and jitter reduction for Transmission Control trafficE enabling TCP header compression

考题 多选题Refer to the exhibit. Which two statements are correct?()AAll six routes will be installed in the routing tableBTwo routes will be installed in the routing tableCFour routes will be installed in the routing tableDAll the routes were redistributed into BGP from an IGPEAll the routes were originated by BGP with the network command

考题 单选题Refer to the exhibit. What switch proves the spanning-tree designated port role for the network segment that services the printers?()A Switch1B Switch2C Switch3D Switch4

考题 多选题Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()APort security needs to be globally enabled.BPort security needs to be enabled on the interface.CPort security needs to be configured to shut down the interface in the event of a violation.DPort security needs to be configured to allow only one learned MAC address.EPort security interface counters need to be cleared before using the show command.FThe port security configuration needs to be saved to NVRAM before it can become active.

考题 单选题Refer to the exhibit. Which Catalyst switch interface command would be used to cause the switch to instruct the phone to override the incoming CoS from the PC before forwarding the packet to the switch?()A switchport priority extend trustB switchport priority extend cos 2C switchport priority extend cos 11D mls qos cos 2E mls qos cos 2 override

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

考题 多选题Refer to the exhibit.   What are three of the basic components of a VoIP network?()Asoftware voice applicationsBmultipoint control unit (MCU)CgatekeeperDcall agentEinteractive voice response (IVR) systemsFsoftphones

考题 多选题Refer to the exhibit. A customer indicates their teleworkers plan to use IP phones in their home offices. The IT department has surveyed the planned teleworkers, resulting in the user groupings shown in the exhibit. To provide the highest voice quality, the best recommendations to this customer are().ADeploy all three groups with a QoS service policy, choosing the parameters for Traffic Shaping based on the average uplink speed across the three groups.BTeleworkers in Groups A and B should inquire with their DSL providers for subscriptions with higher uplink bandwidths.CTeleworkers in Group C should change their subscriptions to DSL for deployment consistency.DTeleworkers in Group A should upgrade their subscription to obtain static IP addressesETeleworkers in Group A should inquire with their DSL providers for subscriptions with higher downlink bandwidths.