AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For CISCO- 100-105





Question ID 14597

A company has placed a networked PC in a lobby so guests can have access to the
corporate directory.
A security concern is that someone will disconnect the directory PC and re-connect their
laptop computer and have access to the corporate network. For the port servicing the
lobby, which three configuration steps should be performed on the switch to prevent this?
(Choose three.)

Option A

Enable port security.

Option B

Create the port as a trunk port.

Option C

Create the port as an access port.

Option D

Create the port as a protected port.

Option E

Set the port security aging time to 0.

Option F

Statically assign the MAC address to the address table.

Correct Answer A,C,F
Explanation Explanation: If port security is enabled and the port is only designated as access port, and finally static MAC address is assigned, it ensures that even if a physical connection is done by taking out the directory PC and inserting personal laptop or device, the connection cannot be made to the corporate network, hence ensuring safety.


Question ID 14598

Refer to the exhibit.

Host A can communicate with Host B but not with Hosts C or D. How can the network
administrator solve this problem?

Option A

Configure Hosts C and D with IP addresses in the 192.168.2.0 network.

Option B

Install a router and configure a route to route between VLANs 2 and 3.

Option C

 Install a second switch and put Hosts C and D on that switch while Hosts A and B remain on the original switch.

Option D

Enable the VLAN trunking protocol on the switch.

Correct Answer B
Explanation Explanation: Two VLANs require a router in between otherwise they cannot communicate. Different VLANs and different IP subnets need a router to route between them.

Send email to admin@getfreedumps for new dumps request!!!