- Home
- Networking
- CCENT/CCNA ICND1 100-105
56.
A switch’s port Gi0/1 has been correctly enabled with port security. The configuration sets the violation mode to restrict. A frame that violates the port security policy enters the interface, followed by a frame that does not. Which of the following answers correctly describe what happens in this scenario? (Choose two answers.)
- A.The switch puts the interface into an err-disabled state when the first frame arrives.
- B.The switch generates syslog messages about the violating traffic for the first frame.
- C.The switch increments the violation counter for Gi0/1 by 1.
- D.The switch discards both the first and second frame.
- Answer & Explanation
- Report
Answer : [B, C]
Explanation :
Explanation :
57.
A Cisco Catalyst switch connects to what should be individual user PCs. Each port has the same port security configuration, configured as follows:
interface range gigabitethernet 0/1 - 24
switchport mode access
switchport port-security
switchport port-security mac-address sticky
Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.)
interface range gigabitethernet 0/1 - 24
switchport mode access
switchport port-security
switchport port-security mac-address sticky
Which of the following answers describe the result of the port security configuration created with these commands? (Choose two answers.)
- A.Prevents unknown devices with unknown MAC addresses from sending data through the switch ports.
- B.If a user connects a switch to the cable, prevents multiple devices from sending data through the port.
- C.Will allow any one device to connect to each port, and will save that device’s MAC address into the startup-config.
- D.Will allow any one device to connect to each port, but will not save that device’s MAC address into the startup-config.
- Answer & Explanation
- Report
Answer : [B and D]
Explanation :
Explanation :
58.
Which of the following devices would be in the same collision domain as PC1?
- A.PC2, which is separated from PC1 by an Ethernet hub
- B.PC3, which is separated from PC1 by a transparent bridge
- C.PC4, which is separated from PC1 by an Ethernet switch
- D.PC5, which is separated from PC1 by a router
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
59.
Which of the following devices would be in the same broadcast domain as PC1? (Choose three answers.)
- A.PC2, which is separated from PC1 by an Ethernet hub
- B.PC3, which is separated from PC1 by a transparent bridge
- C.PC4, which is separated from PC1 by an Ethernet switch
- D.PC5, which is separated from PC1 by a router
- Answer & Explanation
- Report
Answer : [A, B, C]
Explanation :
Explanation :
60.
In a two-tier campus LAN design, which of the following are typically true of the topology design? (Choose two answers.)
- A.The design uses a full mesh of links between access and distribution switches
- B.The design uses a partial mesh of links between access and distribution switches
- C.The design uses a partial mesh of links between the distribution and core switches
- D.The end user and server devices connect directly to access layer switches
- Answer & Explanation
- Report
Answer : [B, D]
Explanation :
Explanation :