B The secure boot comfit command is configured C The confreg 0x24 command is

B the secure boot comfit command is configured c the

This preview shows page 18 - 22 out of 342 pages.

B. The secure boot-comfit command is configured. C. The confreg 0x24 command is configured. D. The reload command was issued from ROMMON. Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 37
Image of page 18
- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command? A. It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the key indefinitely. B. It configures the device to begin transmitting the authentication key to other devices at 23:59:00 local time on December 31, 2013 and continue using the key indefinitely. C. It configures the device to begin accepting the authentication key from other devices immediately and stop accepting the key at 23:59:00 local time on December 31, 2013. D. It configures the device to generate a new authentication key and transmit it to other devices at 23:59:00 local time on December 31, 2013. E. It configures the device to begin accepting the authentication key from other devices at 23:59:00 local time on December 31, 2013 and continue accepting the key indefinitely. F. It configures the device to begin accepting the authentication key from other devices at 00:00:00 local time on January 1, 2014 and continue accepting the key indefinitely. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 38 What type of packet creates and performs network operations on a network device? A. control plane packets B. data plane packets C. management plane packets D. services plane packets Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 39 An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity? A. The switch could offer fake DHCP addresses.
Image of page 19
- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications B. The switch could become the root bridge. C. The switch could be allowed to join the VTP domain. D. The switch could become a transparent bridge. Correct Answer: B Section: (none) Explanation Explanation/Reference: QUESTION 40 In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true identity? A. gratuitous ARP B. ARP poisoning C. IP spoofing D. MAC spoofing Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 41 What command can you use to verify the binding table status? A. show ip dhcp snooping database B. show ip dhcp snooping binding C. show ip dhcp snooping statistics D. show ip dhcp pool E. show ip dhcp source binding F. show ip dhcp snooping Correct Answer: A Section: (none) Explanation
Image of page 20
- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications Explanation/Reference: QUESTION 42 If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?
Image of page 21
Image of page 22

You've reached the end of your free preview.

Want to read all 342 pages?

  • Fall '19
  • IP address, VCE Online

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture