Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The TCP protocol uses the three-way handshake mechanism to establish and disable connections. Therefore, TCP supports reliable data transmission.

A.

TRUE

B.

FALSE

Refer to the display startup command output shown in the figure. Which of the following statements are true?

A.

The current VRP configuration file is different from that used for next startup.

B.

The current VRP configuration file is the same as that used for next startup.

C.

The current VRP version file is different from that used for next startup.

D.

The current VRP version file is the same as that used for next startup.

Refer to the following display vlan command output on SWA. Which of the following interfaces can forward untagged data frames from VLAN 40?

A.

GE0/0/2

B.

GE0/0/3

C.

GE0/0/4

D.

GE0/0/5

By referring to the topology and the configurations of G0/0/1 interfaces on LSW1 and LSW2 shown in the figure, it can be determined that data frames tagged with VLAN 10 can be normally forwarded between LSW1 and LSW2.

A.

TRUE

B.

FALSE

Which of the following is correct regarding the configuration of the trunk port and access port on a switch?

A.

Access ports can only send untagged frames.

B.

Trunk ports can only send tagged frames.

C.

Access ports can only send tagged frames.

D.

Trunk ports can only send untagged frames.

Refer to the following configuration of an interface on a switch. For which VLAN does the interface remove VLAN tags before forwarding data frames?

go

CopyEdit

interface GigabitEthernet0/0/1

port link-type trunk

port trunk pvid vlan 10

port trunk allow-pass vlan 10 20 30 40

A.

30

B.

40

C.

20

D.

10

Which of the following frequency bands are supported by IEEE 802.11n?

A.

2.5 GHz

B.

2.4 GHz

C.

5 GHz

D.

6 GHz

Which of the following configurations can prevent Host A and Host B from communicating with each other?

A.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter inbound acl 2000

B.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/2 traffic-filter inbound acl 2000

C.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/3 traffic-filter inbound acl 2000

D.

acl number 2000 rule 5 deny source 100.0.12.0 0.0.0.255 interface GigabitEthernet0/0/1 traffic-filter outbound acl 2000

To enable Router A to communicate with Loopback 0 on Router B on the network shown in the figure, which of the following commands needs to be run on Router A?

A.

ip route-static 10.0.2.2 32 GigabitEthernet 0/0/0

B.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.1

C.

ip route-static 10.0.2.2 255.255.255.255 10.0.12.2

D.

ip route-static 10.0.2.2 0 GigabitEthernet 0/0/0

After the administrator performs the configuration shown in the figure on a router, which of the following commands can be used to specify a short lease for addresses assigned using DHCP?

A.

dhcp select relay

B.

lease 0

C.

lease day 0 hour 10

D.

lease 24