Refer to the exhibit. Switch#show etherchannel summary



Yüklə 2,03 Mb.
Pdf görüntüsü
səhifə32/39
tarix13.12.2023
ölçüsü2,03 Mb.
#174656
1   ...   28   29   30   31   32   33   34   35   ...   39
ccna new qstns 6

Answer:

Explanation
Option B is not correct as either the link between SW4 & SW11 or the link between SW9 & 
SW11 must allow VLAN 108. But Gi0/2 of SW4 and Gi0/2 of SW9 only allow VLAN 14 -> 
PC3 cannot reach PC9 in VLAN 108. 
Option C is not correct as Gi0/2 of SW4 and Gi0/1 of SW11 only allows VLAN 14 -> PC3 
cannot reach PC9 in VLAN 108. 
Option D has configured Gi0/0 of SW11 but there is no such interface in the topology. Also with 
option D interface Gi0/2 of SW4 and Gi0/2 of SW9 only allow VLAN 14 -> PC3 cannot reach 
PC9 in VLAN 108. 
Question 86
An engineer is configuring switch SW1 to act as an NTP server when all upstream NTP server 
connectivity fails. Which configuration must be used? 


A. SW1# config t 
SW1(config)#ntp server 192.168.1.1 
SW1(config)#ntp access-group server accesslist1 
B. SW1# config t 
SW1(config)3 ntp peer 192.168.1.1 
SW1(config)#ntp access-group peer accesslist1 
C. SW1# config t 
SW1(config)#ntp backup 
SW1(config)#ntp server 192.168.1.1 
D. SW1# config t 
SW1(config)#ntp master 
SW1(config)#ntp server 192.168.1.1 
Answer:_D_Question_87'>Answer:

Question 87
Refer to the exhibit. 
An OSPF neighbor relationship must be configured using these guidelines: 
– R1 is only permitted to establish a neighbor with R2. 
– R1 will never participate in DR elections. 
– R1 will use a router-id of 10.1.1.1. 
Which configuration must be used? 
Option A 
Option B 
Option C 
Option D 


A. Option A 
B. Option B 
C. Option C 
D. Option D 
Answer:

Explanation
R1 will never participate in DR elections -> Set the OSPF priority to 0 (“ip ospf priority 0”) can 
prevent R1 from participate in DR elections -> Only Option B & Option C are correct. 
OSPF is protocol 89 so we must permit it from 10.100.1.2 while blocking from others -> Only 
Option B is correct. 
Question 88
How does authentication differ from authorization? 
A. Authentication verifies the identity of a person accessing a network, and authorization 
determines what resource a user can access. 
B. Authentication is used to determine what resources a user is allowed to access, and 
authorization is used to track what equipment is allowed access to the network 
C. Authentication is used to verify a person’s identity, and authorization is used to create syslog 
messages for logins 
D. Authentication is used to record what resource a user accesses, and authorization is used to 
determine what resources a user can access 

Yüklə 2,03 Mb.

Dostları ilə paylaş:
1   ...   28   29   30   31   32   33   34   35   ...   39




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin