Section: Chapter 3: IP Addressing and VLSM
What is valid reason for a switch to deny port access to new devices when port security is enabled?
A. The den MAC addresses have already been learned or confgured on another secure interface in the
B. The den MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the den MAC addresses have expired.
Section: Chapter 9: Switching
Which statement is correct about the internetwork shown in the diagram?
A. Switch2 is the root bridge.
B. Spanning Tree is not running.
C. HostD and Server1 are in the same subnet.
D. No collision can occur in traffic between Host B and Host C.
E. If Fa0/0 is down on Router1, HostA cannot access Server1.
F. If Fa0/1 is down on Switch3, HostC cannot access Server 2.
Section: Chapter 10: VLAN
Which statement is correct regarding the operation of DHCP?
A. A DHCP client uses a ping to detect address conflicts.
B. A DHCP server uses a gratous ARP to detect DHCP clients.
C. A DHCP client uses a gratous ARP to detect a DHCP server.
D. If an address conflict is detected, the address is removed from the pool and an istrator must
resolve the conflict.
E. If an address conflict is detected, the address removed from the pool for an amount of time configurable by the istrator.
F. If an address conflict is detected, the address is removed from the pool and will not be reused until
server is rebooted.
Section: Chapter 2: TCP/IP
Refer to the diagram. What is the largest configuration file that can be stored on this router?
A. 191K bytes
B. 16384K bytes
C. 31369K bytes
D. 114688K bytes
Section: Chapter 4: Introduction to Cisco IOS