عرض مشاركة واحدة
قديم 03-18-2012, 11:24 AM   #8
فريكر
:: سيسكو مميز ::
 
الصورة الرمزية فريكر
 
تاريخ التسجيل: Jan 2011
المشاركات: 366
شكراً: 11
تم شكره 99 مرة في 42 مشاركة
فريكر will become famous soon enough
إرسال رسالة عبر مراسل MSN إلى فريكر
افتراضي رد: نموذج collisio 486q الاصدار الصحيح

شكرا للتنبيه اخي
صاحب نموذج لم ينتبه لهاذ سؤالين يرجى تصحيح
ويرجى التنبيه لمزيد من الاخطاء

اقتباس:
question 5
computer 1 is consoles into switch a. Telnet connections and pings run from the command prompt on
switch a fail. Which of the following could cause this problem?

A. Switch a does not have a cdp entry for switch b or router jax
b. Switch a does not have an ip address
c. Port 1 on switch a should be an access port rather than a trunk port
d. Switch a is not directly connected to router jax
e. Switch a does not have a default gateway assigned

answer: B
explanation
it’s a hard question to answer although it looks simple! From the output above we are sure that switch a
does not have an ip address (on both fa0/1 and on vlan 1) so it can not ping or telnet to any other device -
> b is correct.
Another answer seems to be correct is answer e – switch a does not have a default gateway assigned. We
know that switch a can not telnet to other device outside its subnet without having a default gateway. But
the question only says “telnet connections and pings run from the command prompt on switch a fail”
without telling us where switch a is trying to telnet or ping to. If it tries to connect to the outside network
then e is correct. If it only want to connect to a device inside its subnet then a default gateway is not
necessary.
So the best answer for this question is b!
اقتباس:
question 4
which two statements apply to dynamic access lists? (choose two)
a. They offer simpler management in large internetworks.
B. You can control logging messages.
C. They allow packets to be filtered based on upper-layer session information.
D. You can set a time-based security policy.
E. They provide a level of security against spoofing.
F. They are used to authenticate individual users.
Answer: A f

explanation
dynamic acls have the following security benefits over standard and static extended acls:
+ use of a challenge mechanism to authenticate individual users
+ simplified management in large internetworks
+ in many cases, reduction of the amount of router processing that is required for acls
+ reduction of the opportunity for network break-ins by network xxxxxxs
+ creation of dynamic user access through a firewall, without compromising other configured security
restrictions
(reference: Ccna exploration 4 – dynamic acls)
__________________

y0u 5t!11 !n m¥ h34rt 4 3v3r

فريكر غير متواجد حالياً   رد مع اقتباس
 

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36