Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A.Port security needs to be globally enabled.
B.Port security needs to be enabled on the interface.
C.Port security needs to be configured to shut down the interface in the event of a violation.
D.Port security needs to be configured to allow only one learned MAC address.
E.Port security interface counters need to be cleared before using the show command.
F.The port security configuration needs to be saved to NVRAM before it can become active.
第1题:
Refer to the exhibit. The partial configuration for an OSPF ASBR and an Area 0 ABR is shown. Assume the OSPF configurations throughout the network are operable. Which statement about these configurations is true? ()
A. The ASBR route - maps are basically useless, because there are no deny prefix - lists.
B. LSA Type 5s wil l not be received by the ABR from the ASBR.
C. The OSPF backbone will not learn any RFC 1918 addresses.
D. The matched prefix - list addresses will be given a metric of 255, which is essentially unreachable.
第2题:
Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()
A. 1
B. 2
C. 3
D. 4
E. 5
第3题:
A.255.255.255.0
B.255.255.254.0
C.255.255.252.0
D.255.255.248.0
第4题:
A.Check the trunk encapsulation mode for SwitchC‘s fa0/1 port.
B.Check the duplex mode for SwitchC‘s fa0/1 port.
C.Check the duplex mode for SwitchA‘s fa0/2 port.
D.Check the trunk encapsulation mode for SwitchA‘s fa0/2 port.
第5题:
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()
第6题:
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
第7题:
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()
第8题:
10.1.1.2
10.154.154.1
172.16.5.1
192.168.5.3
第9题:
inetconv -f
inetcfg -i /etc/inetd.conf
inetcfg -o /etc/inetd.conf
inetconv -f -i /etc/inetd.conf
inetconv -forceimport -o /etc/inetd.conf
第10题:
All six routes will be installed in the routing table
Two routes will be installed in the routing table
Four routes will be installed in the routing table
All the routes were redistributed into BGP from an IGP
All the routes were originated by BGP with the network command
第11题:
Port security needs to be globally enabled.
Port security needs to be enabled on the interface.
Port security needs to be configured to shut down the interface in the event of a violation.
Port security needs to be configured to allow only one learned MAC address.
Port security interface counters need to be cleared before using the show command.
The port security configuration needs to be saved to NVRAM before it can become active.
第12题:
software voice applications
multipoint control unit (MCU)
gatekeeper
call agent
interactive voice response (IVR) systems
softphones
第13题:
A.The last default - network statement will always be preferred.
B.A route to the 140.140.0.0 network does not exist in the routing table.
C.Default - network selection will always prefer the statement with the lowest IP address.
D.A router will load balance across multiple default - networks; repeatedly issuing the show ip route command would show the gateway of last resort changing between the two networks.
第14题:
A. 10.1.1.2
B. 192.168.1.49
C. 10.1.1.1
D. 192.168.1.50
第15题:
A.data link layer
B.application layer
C.access layer
D.session layer
E.network layer
第16题:
Refer to the exhibit. The two exhibit devices are the only Cisco devices on the network. The serial network between the two devices has a mask of 255.255.255.252. Given the output that is shown, what three statements are true of these devices? ()
A.The Manchester serial address is 10.1.1.1
B.The Manchester serial address is 10.1.1.2
C.这个Manchester路由器串口地址为:10.1.12
D.The London router is a Cisco 2610.
E.The Manchester router is a Cisco 2610.
F.The CDP information was received on port Serial0/0 of the Manchester router.
G.The CDP information was sent by port Serial0/0 of the London Router.
第17题:
Refer to the exhibit. What are three of the basic components of a VoIP network?()
第18题:
You are a network administrator for ExamSheet.net's Windows 2000 network. Your computer is installed with Windows 2000 Professional. You schedule a task that will copy files from your computer to another computer on the network. You notice that the task is not completing correctly. You manually copy the files from your computer to other computers on the network without any errors. You verify that all of your other tasks are working correctly. You want the task to complete successfully. What should you do? ()
第19题:
You are a network administrator for ExamSheet.net's Windows 2000 network. You use a user account named User1 to log on tot a Windows 2000 Professional computer. The computer is used by different students in a classroom. User1 does not have administrative rights. However, you prefer to use this account for your daily activities. Using the Task Scheduler you schedule a task to run a command file named AddUsers.cmd that automatically adds six more student user accounts. You configure the task to run as the administrator account. After the task was scheduled to have run you open the Task Scheduler and discover a status of "Could not start" for the task. You also discover account logon failure audit events in the computer's Security log.You want the scheduled task to successfully run AddUsers.cmd. You want to accomplish this with the least amount of administrative effort. What should you do?()
第20题:
data link layer
application layer
access layer
session layer
network layer
第21题:
STP
GVRP
SNMP
VTP
DHCP
第22题:
Switch1
Switch2
Switch3
Switch4
第23题:
Physically the voice network and the data network are separate
The voice traffic will normally be on a different IP subnet than will the data traffic
End user intervention is necessary to place the phone into the proper VLAN
The same security policy should be implemented for both voice and data traffic
The data VLAN must be configured as the native VLAN
第24题:
The network administrator faled to save the configuration.
The configuration register is set to 0x2100.
The boot system flash command is missing from the configuration.
The configuraiton register is set to 0x2102.
The router is configured with the boot system startup command.