-
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1.
What will be the result?()
https://assets.asklib.com/images/image2/2018073109373869334.jpg
A . The command will be rejected by the switch.
B . Interfaces FastEthernet0/13 and FastEthernet0/14 will no longer be bundled.
C . Dynamic Trunking Protocol will be turned off on interfaces FastEthernet0/13 and FastEthernet0/14.
D . Interfaces FastEthernet0/13 and FastEthernet0/14 will only allow traffic from the native VLAN.
E . Interfaces FastEthernet0/13 and FastEthernet0/14 will continue to pass traffic for VLANs 88,100,360.
-
Refer to the exhibit. The Linksys router in the diagram is performing pNAT (port network address translation). What hash algorithm should you choose and why?()https://assets.asklib.com/images/image2/201808011413313225.jpg
A . Use hash MD5 to ensure that IKE works through NAT.
B . Use ah-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
C . Use 3DES, as it will encrypt the IPSec header IP addresses and bypass addressing issues.
D . Use esp-sha-hmac, as it does not check the integrity of the IP header. The IP header will change due to NAT.
-
Refer to the exhibit. The output that is shown is generated at a switch. Which three of these statements are true? ()
A . All ports will be in a state of discarding, learning, or forwarding.
B . Thirty VLANs have been configured on this switch.
C . The bridge priority is lower than the default value for spanning tree.
D . All interfaces that are shown are on shared media.
E . All designated ports are in a forwarding state.
F . The switch must be the root bridge for all VLANs on this switch.
-
Refer to the exhibit. The Greene Supply Company is integrating Cisco Unified CallManager Express into a SIP network. Which two statements are accurate?()https://assets.asklib.com/images/image2/2018080110541912928.jpg
A . SIP support in dial peers is a Cisco IOS function.
B . Use the notify-based DTMF relay mechanism that is proprietary to Cisco.
C . SIP support in Cisco IOS is a function of localized call processing integrated with Cisco Unity Express.
D . Use either the notify-based DTMF relay mechanism that is proprietary to Cisco or the RFC-based DTMF relay.
E . The SIP server must be configured for the E.164 numbers that are going to register with the Cisco CallManager Express database. &e
-
Refer to the exhibit. The company uses EIGRP as the routing protocol. What path will packets take from a host on 192.168.10.192/26 network to a host on the LAN attached to router R1?()https://assets.asklib.com/images/image2/2018072410123247953.jpg
A . The path of the packets will be R3 to R2 to R1.
B . The path of the packets will be R3 to R1 to R2.
C . The path of the packets will be both R3 to R2 to R1 and R3 to R1.
D . The path of the packets will be R3 to R1
-
Refer to the exhibit. The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems? ()https://assets.asklib.com/images/image2/2018072409503135369.jpg
A . Configure the gateway on Host A as 10.1.1.1.
B . Configure the gateway on Host B as 10.1.2.254.
C . Configure the IP address of Host A as 10.1.2.2.
D . Configure the IP address of Host B as 10.1.2.2.
E . Configure the masks on both hosts to be 255.255.255.224.
F . Configure the masks on both hosts to be 255.255.255.240.
-
What does the term application partitioning refer to?()
A . The feature of a forms application enabling it to run both in client-server mode and on the Web.
B . Storing PL/SQL program units between the Oracle server and the application to make optimal use of available resources.
C . The nature of a three-tier architecture, where the form module and processing software reside on an application server.
D . The feature of a forms application that is able to use Ethernet, twisted pair, and wireless data connections.
-
Refer to the exhibit.The network shown in the diagram is experiencing connectivity problems. Which of the following will correct the problems?()https://assets.asklib.com/images/image2/2018072315363967838.jpg
A . Configure the gateway on Host A as 10.1.1.1.
B . Configure the gateway on Host B as 10.1.2.254.
C . Configure the IP address of Host A as 10.1.2.2.
D . Configure the IP address of Host B as 10.1.2.2.
E . Configure the masks on both hosts to be 255.255.255.224.
F . Configure the masks on both hosts to be 255.255.255.240.
-
Refer to the exhibit. The wireless user is moving from right to left towards AP2.
What are three reasons that the wireless client would initiate roaming?()
https://assets.asklib.com/images/image2/2018073011464176099.jpg
A . The minimum data retry count from AP1 is exceeded.
B . The maximum data retry count from AP1 is exceeded.
C . The client has missed too many beacons from AP1.
D . The client data rate from AP1 has been reduced.
E . The client has received too many beacons from AP2.
F . The client data rate from AP2 has been increased.
-
Refer to the exhibit. The network has been configured with H.323 gateways and gatekeepers as shown. Which statement is true when a call is placed?()https://assets.asklib.com/images/image2/2018072416330097077.jpg
A . A gatekeeper is contacted to determine the correct local gateway to use.
B . A gateway will receive the call and forward a call request to the local gatekeeper.
C . A gateway will receive the call and forward a call request to the gatekeeper on the other side of the WAN
D . A gatekeeper will receive the call and forward a call request to the remote gateway.
-
Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1. Given the output that was generated,
which two security statement are true? ()
https://assets.asklib.com/images/image2/2018073011082032151.jpg
A . Interface FastEthernet 0/1 was configured with the switchport port-security aging command.
B . Interface FastEthernet 0/1 was configured with the switchport port-security protect command.
C . Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.
D . When the number of secure IP addresses reaches 10, the interface will immediately shut down.
E . When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent.
-
Refer to the exhibit.The user at Workstation B reports that Server A cannot be reached.What is
preventing Workstation B from reaching Server A?()
https://assets.asklib.com/images/image2/2018072314223641406.jpg
A . The IP address for Server A is a broadcast address.
B . The IP address for Workstation B is a subnet address.
C . The gateway for Workstation B is not on the same subnet.
D . The gateway for Server A is not on the same subnet.
-
Refer to the exhibit. The signal transmitted from the AP is reflected off a wall resulting in multipath interference at the client end.
Which statement is true? ()
https://assets.asklib.com/images/image2/2018073011322911230.jpg
A . The transmitted signal from the AP arrives at the client at slightly different times resulting in phase shifting.
B . If signal 2 is close to 360 degrees out of phase with signal 1, the result is essentially zerosignal or a dead spot in the WLAN.
C . Multipath interference is less of an issue when using a DSSS technology because multipath is frequency selective.
D . If signal 1 is in phase with signal 2, the result is essentially zerosignal or a dead spot in the WLAN.
E . Multipath interference is solved by using dual antennas.
-
Refer to the exhibit. The DHCP configuration that is shown is configured on a Cisco router. Whichstatement is true?()
A . The router will distribute IP addresses from pool 1 until its addresses are exhausted. Then therouter will begin distributing addresses from pool 2
B . The configuration is invalid because the DHCP options are global configuration commands
C . The configuration is incomplete until the DHCP pools are bound to the appropriate interface orinterfaces
D . The router will choose which pool to use based upon the interface the DHCP request wasreceived o
-
Refer to the exhibit The neighbor 10.1.1.1 weight 200 BGP configuration command has been configured on router A. What will be the result of this configuration? ()https://assets.asklib.com/images/image2/201807301401135173.jpg
A . Router A will prefer the path through router B for network 172.20.0.0
B . Router A will prefer the path through router C for network 172.20.0.0
C . Packets from router D will prefer the path through router B for networks advertised by router A
D . Packets from r outer D will prefer the path through router C for networks advertised by router A
-
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reacheD.What ispreventing Workstation B from reaching Server A?()https://assets.asklib.com/images/image2/2018072310420052572.jpg
A . The IP address for Server A is a broadcast address.
B . The IP address for Workstation B is a subnet address.
C . The gateway for Workstation B is not on the same subnet.
D . The gateway for Server A is not on the same subnet.
-
What does the title --- The Icy Defender refer to?
-
In CSE style, we don’t need to use numbers within the text to refer to the end references.
-
In CSE style, we don ’ t need to use numbers within the text to refer to the end references.
-
What are the “Four Books” refer to ?
-
一What do you think of the film last night?
一To be honest, action films don’t ______to me much. A.refer B.belong C.appeal D.occur
-
The next two questions refer to the following passage:
A pharmaceutical company tested a new painkiller on 1,000 lab rats that were fed large doses of the painkiller for a two-month period. By the end of the experiment, 39 of tile rats had died. The company concluded that the painkiller was sufficiently safe to test on humans.
Which of the following, if true, provides the most support for the pharmaceutical company's conclusion?
A.The amount of painkiller fed to the rats was substantially greater, in relation to body mass, than the dosage any human would take under normal circumstances.
B.Because of the different body chemistry of humans and rats, some compounds can be dangerous for rats but safe for humans, and vice versa.
C.Tests of this same painkiller on dogs showed that 3 out of 50 dogs developed lesions on their livers during the course of the experiment.
D.The researchers found that during the experiment, the rats showed a significantly lower sensitivity to pain than rats do under normal circumstances.
E.In an experiment of this length with this number of rats, it is not unusual for up to 50 rats to die during the experiment for reasons unrelated to the experiment itself.
-
一 Is that the small town you often refer to?— Right, Just the one_____you know I used t
A.A.that
B.B.which
C.C.where
D.D.what
-
Who does "the listener" in the first paragraph refer to()
A.The writer
B.The child
C.The parent
D.The teacher