Computer Networking
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure

1 and 3
2, 3 and 5
2 and 4
4 and 5

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?

Configure many subinterfaces in the same subnet.
Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface.
Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.
Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?

A physical address that is randomly assigned each time the computer is started
A physical address that is assigned by the manufacturer
An alias for the computer name
The logical domain address for the workstation
A logical address that identifies the workstation

ANSWER DOWNLOAD EXAMIANS APP