شكرا للتنبيه اخي
صاحب نموذج لم ينتبه لهاذ سؤالين يرجى تصحيح
ويرجى التنبيه لمزيد من الاخطاء
question 5 |
computer 1 is consoles into switch a. Telnet connections and pings run from the command prompt on
switch a fail. Which of the following could cause this problem?
A. Switch a does not have a cdp entry for switch b or router jax
b. Switch a does not have an ip address
c. Port 1 on switch a should be an access port rather than a trunk port
d. Switch a is not directly connected to router jax
e. Switch a does not have a default gateway assigned
it’s a hard question to answer although it looks simple! From the output above we are sure that switch a
does not have an ip address (on both fa0/1 and on vlan 1) so it can not ping or telnet to any other device -
> b is correct.
Another answer seems to be correct is answer e – switch a does not have a default gateway assigned. We
know that switch a can not telnet to other device outside its subnet without having a default gateway. But
the question only says “telnet connections and pings run from the command prompt on switch a fail”
without telling us where switch a is trying to telnet or ping to. If it tries to connect to the outside network
then e is correct. If it only want to connect to a device inside its subnet then a default gateway is not
So the best answer for this question is b!
question 4 |
which two statements apply to dynamic access lists? (choose two)
a. They offer simpler management in large internetworks.
B. You can control logging messages.
C. They allow packets to be filtered based on upper-layer session information.
D. You can set a time-based security policy.
E. They provide a level of security against spoofing.
F. They are used to authenticate individual users.
Answer: A f
dynamic acls have the following security benefits over standard and static extended acls:
+ use of a challenge mechanism to authenticate individual users
+ simplified management in large internetworks
+ in many cases, reduction of the amount of router processing that is required for acls
+ reduction of the opportunity for network break-ins by network xxxxxxs
+ creation of dynamic user access through a firewall, without compromising other configured security
(reference: Ccna exploration 4 – dynamic acls)