Refer to the exhibit. Each of these four switches has been configured with a hostname, as well as
being configured to run RSTP. No other configuration changes have been made. Which one of
these show the correct RSTP port roles for the indicated switches and interfaces?
A -
SwitchA, Fa0/2, designated
B -
SwitchA, Fa0/1, root
C -
SwitchD, Gi0/2, root
D -
All of the above
2-
Refer to the exhibit. A junior network administrator was given the task of configuring port security
on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other
device is detected, the port is to drop frames from this device. The administrator configured the
interface and tested it with successful pings from PC_A to RouterA, and then observes the output
from one show commands.
Which one of these changeso is necessary for SwitchA to meet the requirements?
A -
Configure port security to shut down the interface in the event of a violation.
B -
Port security needs to be enabled on the interface.
C -
Enable port security globally.
D -
Port security interface counters need to be cleared before using the show command.
3-
Which of the following correctly describe steps in the OSI data encapsulation process?
A -
The transport layer divides a data stream into segments and may add reliability and flow control information.
B -
The data link layer adds physical source and destination addresses and an FCS to the segment.
C -
Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D -
The presentation layer translates bits into voltages for transmission across the physical link.
4-
For which type of connection should a straight-through cable be used?
A -
switch to switch
B -
switch to hub
C -
switch to router
D -
hub to hub
5-
Which set of commands is recommended to prevent the use of a hub in the access layer?
A -
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1