Computer Networking
You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure

4 and 5
2 and 4
1 and 3
2, 3 and 5

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.

Ethernet, because it is cabled using fiber-optic cable
Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies
Token-Ring, because it uses a MAU
Ethernet, because it can be set up with most topologies and can use multiple transfer speeds
Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?

You copied the configuration into flash memory instead.
The copy did not override the shutdown command in running-config.
The IOS became corrupted after the copy command was initiated.
You copied the wrong configuration into RAM.

ANSWER DOWNLOAD EXAMIANS APP