B.
The secure boot-comfit command is configured.
C.
The confreg 0x24 command is configured.
D.
The reload command was issued from ROMMON.
Correct Answer:
A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37

- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications
What is the effect of the send-lifetime local 23:59:00 31 December 31 2013 infinite command?
A.
It configures the device to begin transmitting the authentication key to other devices at 00:00:00 local time on January 1, 2014 and continue using the
key indefinitely.
B.
It configures the device to begin transmitting the authentication key to other devices at 23:59:00 local time on December 31, 2013 and continue using
the key indefinitely.
C.
It configures the device to begin accepting the authentication key from other devices immediately and stop accepting the key at 23:59:00 local time
on December 31, 2013.
D.
It configures the device to generate a new authentication key and transmit it to other devices at 23:59:00 local time on December 31, 2013.
E.
It configures the device to begin accepting the authentication key from other devices at 23:59:00 local time on December 31, 2013 and continue
accepting the key indefinitely.
F.
It configures the device to begin accepting the authentication key from other devices at 00:00:00 local time on January 1, 2014 and continue
accepting the key indefinitely.
Correct Answer:
B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 38
What type of packet creates and performs network operations on a network device?
A.
control plane packets
B.
data plane packets
C.
management plane packets
D.
services plane packets
Correct Answer:
A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
An attacker installs a rogue switch that sends superior BPDUs on your network. What is a possible result of this activity?
A.
The switch could offer fake DHCP addresses.

- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications
B.
The switch could become the root bridge.
C.
The switch could be allowed to join the VTP domain.
D.
The switch could become a transparent bridge.
Correct Answer:
B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 40
In what type of attack does an attacker virtually change a device's burned-in address in an attempt to circumvent access lists and mask the device's true
identity?
A.
gratuitous ARP
B.
ARP poisoning
C.
IP spoofing
D.
MAC spoofing
Correct Answer:
D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
What command can you use to verify the binding table status?
A.
show ip dhcp snooping database
B.
show ip dhcp snooping binding
C.
show ip dhcp snooping statistics
D.
show ip dhcp pool
E.
show ip dhcp source binding
F.
show ip dhcp snooping
Correct Answer:
A
Section: (none)
Explanation

- Download A+ VCE (latest) free Open VCE Exams - VCE to PDF Converter - VCE Exam Simulator - VCE Online - IT Certifications
Explanation/Reference:
QUESTION 42
If a switch receives a superior BPDU and goes directly into a blocked state, what mechanism must be in use?


You've reached the end of your free preview.
Want to read all 342 pages?
- Fall '19
- IP address, VCE Online