Where does a switch maintain DHCP snooping information?
Ain the MAC address table
Bin the CAM table
Cin the binding database D. in the frame forwarding database
Correct Answer:C
Q365(none)
Which type of security program is violated when a group of employees enters a building using the ID badge of only one person?
Aintrusion detection
Buser awareness
Cphysical access control
Dnetwork authorization
Correct Answer:C
Q366(none)
A network administrator needs to aggregate 4 ports into a single logical link which must negotiate layer 2 connectivity to ports on another switch What must be configured when using active mode on both sides of the connection?
A802.1q trunks
BCisco vPC
CLLDP
DLACP
Correct Answer:D
Q367(none)
In which situation is private IPv4 addressing appropriate for a new subnet on the network of an organization?
AThere is limited unique address space, and traffic on the new subnet will stay local within the organization.
BThe network has multiple endpoint listeners, and it is desired to limit the number of broadcasts.
CTraffic on the subnet must traverse a site-to-site VPN to an outside organization.
DThe ISP requires the new subnet to be advertised to the internet for web services.
Correct Answer:A
QUESTION 368 Aside from discarding, which two states does the switch port transition through while using RSTP (802.1w)? (Choose two) A. listening B. blocking C. forwarding D. learning E. speaking Correct Answer: CD Section: (none) Explanation Explanation/Reference:
Q369(none)
Which state does the switch port move to when PortFast is enabled?
Aforwarding
Blistening
Cblocking
Dlearning
Correct Answer:A
Q370(none)
Refer to the exhibit. An access list is created to deny Telnet access from host PC-1 to RTR-1 and allow access from all other hosts A Telnet attempt from PC-2 gives this message:”% Connection refused by remote host” Without allowing Telnet access from PC-1, which action must be taken to permit the traffic? A. Add the access-list 10 permit any command to the configuration
BRemove the access-class 10 in command from line vty 0.4.
CAdd the ip access-group 10 out command to interface g0/0.
DRemove the password command from line vty 0 4.
Correct Answer:A
Q371(none)
What is a role of wireless controllers in an enterprise network?
Acentralize the management of access points in an enterprise network
Bsupport standalone or controller-based architectures
Cserve as the first line of defense in an enterprise network
Dprovide secure user logins to devices on the network.
Correct Answer:A
Q372(none)
What is the effect when loopback interfaces and the configured router ID are absent during the OSPF Process configuration?
ANo router ID is set, and the OSPF protocol does not run.
BThe highest up/up physical interface IP address is selected as the router ID.
CThe lowest IP address is incremented by 1 and selected as the router ID.
DThe router ID 0.0.0.0 is selected and placed in the OSPF process.
Correct Answer:B
Q373(none)
What is recommended for the wireless infrastructure design of an organization?
Agroup access points together to increase throughput on a given channel
Bconfigure the first three access points are configured to use Channels 1, 6, and 11
Cinclude a least two access points on nonoverlapping channels to support load balancing
Dassign physically adjacent access points to the same Wi-Fi channel
Correct Answer:B
Q374(none)
Which 802.11 frame type is indicated by a probe response after a client sends a probe request?