An administrator has connected devices to an industrial switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?
An administrator has connected devices to an industrial switch and, for security reasons, wants the dynamically learned MAC addresses from the address table added to the running configuration. What must be done to accomplish this?A . Enable port security and use the keyword sticky.B . Set the switchport mode to...
Which of the following correctly pairs the dotted decimal subnet mask with the correct number of binary bits that represent the subnet mask?
Which of the following correctly pairs the dotted decimal subnet mask with the correct number of binary bits that represent the subnet mask?A . 255.255.255.192 and /25B . 255.255.255.248 and /28C . 255.255.255.224 and /26D . 255.255.255.248 and /27E . 255.255.255.240 and /28F . 255.255.255.240 and /16View AnswerAnswer: E
Refer to the exhibit. Host 3 on Network A is sending data to Host 8 on Network B. Which address is the default gateway of Host 3?
Exhibit: Refer to the exhibit. Host 3 on Network A is sending data to Host 8 on Network B. Which address is the default gateway of Host 3?A . the address of the switch interface that is connected to router interface Fa0/0B . the address of the switch interface that...
Which two ports does EtherNet/IP use to communicate? (Choose two.)
Which two ports does EtherNet/IP use to communicate? (Choose two.)A . TCP 44818B . UDP 44818C . TCP 502D . UDP 502E . TCP 2222F . UDP 2222View AnswerAnswer: A, F
What are two benefits of a star network topology? (Choose two.)
What are two benefits of a star network topology? (Choose two.)A . Disruption of the entire network is not required when adding new machines.B . Any problem which leaves the network inoperable can be traced to the central hub.C . This network type requires less cable as compared to linear...
Which three of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN? (Choose three.)
Which three of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN? (Choose three.)A . designated portsB . duplex operating modeC . fast mode portsD . root bridgeE . root portsF . BDPU priorityView AnswerAnswer: A, D, E
Why is SSH preferred over Telnet as a method of accessing a network device to alter or view the configuration?
Why is SSH preferred over Telnet as a method of accessing a network device to alter or view the configuration?A . Telnet encrypts only the login information, not the entire transmission.B . SSH requires fewer network resources and no additional configuration.C . Telnet is more difficult to use and configure...
What is the purpose of Spanning Tree Protocol?
What is the purpose of Spanning Tree Protocol?A . to prevent routing loopsB . to create a default routeC . to provide multiple gateways for hostsD . to maintain a loop-free Layer 2 network topologyE . to enhance the functions of SNMPView AnswerAnswer: D
Refer to the exhibit. Host 3 on Network A is sending data to Host 8 on Network B. Which address is the default gateway of Host 3?
Exhibit: Refer to the exhibit. Host 3 on Network A is sending data to Host 8 on Network B. Which address is the default gateway of Host 3?A . the address of the switch interface that is connected to router interface Fa0/0B . the address of the switch interface that...
Which three of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN? (Choose three.)
Which three of the following components must be elected before the Spanning Tree Protocol can converge in a switched LAN? (Choose three.)A . designated portsB . duplex operating modeC . fast mode portsD . root bridgeE . root portsF . BDPU priorityView AnswerAnswer: A, D, E