100% found this document useful (2 votes)
2K views7 pages

Chapter 05

CCNA2 V6.0 Chapter 05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF or read online on Scribd
100% found this document useful (2 votes)
2K views7 pages

Chapter 05

CCNA2 V6.0 Chapter 05
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF or read online on Scribd
You are on page 1/ 7
1. A production switch is reloaded and finishes with a Switeh> prompt. What two facts can be determined? (Choose two.) @ Aruversion ote cisco 105 was locate anctoaded. B_Treretsnotenougn Ral or ash on route: POST eczues normaly The bootorocess was intrupted BThe scr ci noticat the Cisco 10Sin fash, soit eau to ROM. 2. Inwhich situation would a technician use the show interfaces switch command? © todatermine the MAC acess ofa direc allached network device on a paricula interes vnhen packets are being cropped tom a partcular dvecty atached host vwnen an end device can reach local devices, butnatramote devicas © datormne tremors access enabled 3 What is the effect of using the switchport port-security command? © enables portsecuity on an intertace © automaticaly shut an irtertace down it app to a tak pert ) detects he tet MAC adéressin a rame that comes into a pert and places hat MAC address in he MAC address lable © enabies portsecutty globally on te switch THIv show interfaces fastEtieraet 0/6 258/285, cxtoea 1/258, selon 2/255 Encapmsisescn ARPA, Intpease not 20 Keepsitre st? (20 Sec) Full-dupien, 100Mb/s, media tape 42 RIGS Enpuc qaeuer 0/75/0. (stz0/mux/drops)7 Toval ousput drape: © 40. (aise les) 1 3 bits/sec, 0 packets/sec 7294 packets input, 20208 Byres, Ono burter Glanput packess with Gripble condition decected Refer to the exnibil. A network technician is troubleshooting connectivity Issues in an Ethernet network with the command show interfaces fastEthernet 0/0. Whal conclusion can De ‘Gran based on the pattial output in the exhibit? © Thee me cts nee that ana rane nse ha len han ain agh (©: pratreing NAC cm cnn oni tii i sng ht ln bt re (© ection ft so nacre clig itera thn © Ae pont nthe eter cammuneat flip mas svicent contig! 4p gsm version 2 Svitehieontig|# 1p dbnainchane ciscecom Seiten eontig|¥ erymeo Roy gonorate rea, Seiten eontig| Lime ey 8 Sotehljeentig- (ane ¢ Crammpaet iapat all Refer to the exhibit. The network administrator wants to configure Switch’ to allow SSH ‘connections and prohibit Telnet connections. How should the network administrator change the displayed configuration to satisfy the requirement? (© Modi the tansportinpt command, © Contgure SSH ona dierent ine. © Reconfigure he RSA ey Which command is used to set the BOOT environment variable that defines where to find the 1OS image file on a switch? © conta easter © contreg ‘A network administrator configures the port security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum. umber of MAC addresses is reached, a frame with the unknown source MAC address is, dropped and a notification is sent to the syslog server. Which security violation mode should be configured for each access port? © protect © shutdown © testes © wamng ‘Which two statements are true regarding switch port security? (Choose two.) @ trtewortnan the maximum number o!MAC addresses for aportare configured sical, namical eared addresses are ‘a9eea%9 GAM ure maximum numbers reached “Tne hee contgurale violation moses allequire useritvention to re-enable ports “Tre three configurable vilaion moder allog violations via SNMP, sao Dynamical loaned secure MAC adetorsoe ae lost won Be eich raboo. B ‘Aer entenng the steky parameter only MAC adatesces subsequent learned are converedto secure MAG adcrsses. ADG_S24-ahow port-security interface faxtetherset 0/3 Aging Tie Oaine Aging Type 5 Ansciste Securestacie Addreas Aging + Disabled Sticky MAC Aaaresses 1 Refer to the exhibit. What can be determined about port security from the information that is shown? © tmeporinas me maumum number otMAC assesses nals support by a Layer? swtehportubin|scontgured por seam © Theperthasbzen shutdown © The prtvilaton modes the deta ior any portinathas port securiy enabled ‘To prthas we atachod devices 10 if one end of an Ethemet connection is configured for full duplex and the other end of the connection is configured for half duplex, where would late collisions be observed? nme ui-aupiex eta ore comecton © ontnenatt.cutox end ore connection "1 [Soitch show interface £20/1 FastRtherwer0/1 49 up, Lina protocol 42 up (comected} Meravare 12 uence, acvess 12 0US0.0f29.2601 (baa W030. 0129-2502) reLisbs lity 255/255, txload 1/255, reload 1/255

You might also like