What must be done to accomplish this?
An administrator has connected devices to a switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?A . Enable port security and use the keyword sticky.B . Set the switchport mode to trunk...
Drag and Drop Question
Drag and Drop Question On the left are various network protocols. On the right are the layers of the TCP/IP model. Assuming a reliable connection is required, move the protocols on the left to the TCP/IP layers on the right to show the proper encapsulation for an email message sent...
To what does the 128 refer to in the router output above?
168.12.0/24 is variably subnetted, 9 subnets, 3 masks C 192.168.12.64 /28 is directly connected, Loopback1 C 192.168.12.32 /28 is directly connected, Ethernet0 C 192.168.12.48 /28 is directly connected, Loopback0 O 192.168.12.236 /30 [110/128] via 192.168.12.233, 00:35:36, Serial0 C 192.168.12.232 /30 is directly connected, Serial0 O 192.168.12.245 /30 [110/782] via 192.168.12.233,...
What is the effect of using the service password-encryption command?
What is the effect of using the service password-encryption command?A . Only the enable password will be encrypted.B . Only the enable secret password will be encrypted.C . Only passwords configured after the command has been entered will be encrypted.D . It will encrypt the secret password and remove the...
What are two common TCP applications? (Choose two.)
What are two common TCP applications? (Choose two.)A . TFTPB . SMTPC . SNMPD . FTPE . DNSView AnswerAnswer: BD Explanation: SMTP uses TCP port 25, while FTP uses TCP ports 20 and 21. http://pentestlab.wordpress.com/2012/03/05/common-tcpip-ports/
What subnet mask would accommodate this network?
Refer to the exhibit. The enterprise has decided to use the network address 172.16.0.0. The network administrator needs to design a classful addressing scheme to accommodate the three subnets, with 30, 40, and 50 hosts, as shown. What subnet mask would accommodate this network?A . 255.255.255.192B . 255.255.255.224C . 255.255.255.240D...
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)
Which two characteristics describe the access layer of the hierarchical network design model? (Choose two.)A . layer 3 supportB . port securityC . redundant componentsD . VLANsE . PoEView AnswerAnswer: BD Explanation: The primary function of an access-layer is to provide network access to the end user. The hardware and...
How many collision and broadcast domains exist on the switch (collision, broadcast)?
A switch has 48 ports and 4 VLANs. How many collision and broadcast domains exist on the switch (collision, broadcast)?A . 4, 48B . 48, 4C . 48, 1D . 1, 48E . 4, 1View AnswerAnswer: B Explanation: A switch uses a separate collision domain for each port, and each...
If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed?
Refer to the exhibit. If the resume command is entered after the sequence that is shown in the exhibit, which router prompt will be displayed?A . Router1>B . Router1#C . Router2>D . Router2#View AnswerAnswer: C Explanation: The Ctrl-Shift-6 x command suspends the telnet session and hence the prompt will again...
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?
If a host experiences intermittent issues that relate to congestion within a network while remaining connected, what could cause congestion on this LAN?A . half-duplex operationB . broadcast stormsC . network segmentationD . multicastingView AnswerAnswer: B Explanation: A broadcast storm can consume sufficient network resources so as to render the...