Question 6 of 164

Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed.

What actions can be taken by the administrator to prevent further changes? (Choose three)

    Correct Answer: BCD

    To prevent unauthorized changes to the router's configuration, the administrator should ensure that user management and access control measures are in place. Configuring AAA (Authentication, Authorization, and Accounting) helps manage user access and permissions effectively. An Access Control List (ACL) can be set up to allow only the administrator to access the router, significantly reducing the risk of unauthorized changes. Port-security configuration is also critical as it can restrict access to the router based on the MAC addresses of devices, thereby adding an additional layer of security. However, setting the login privilege of users to 0 (Option A) is not practical as it would typically deny all capabilities to the users, including valid administrative actions.

Question 7 of 164

Refer to the configuration output. Which of the following statements is correct regarding the configuration of the ACL on RTA?

    Correct Answer: A

    The ACL rules are evaluated in order of their sequence numbers. Rule 10 denies packets from the source network 20.1.1.0/24, and since it is listed before rule 20, which permits the same network, packets from network 20.1.1.0/24 will be denied as soon as rule 10 is matched. Therefore, the correct statement is that packets from network 20.1.1.0/24 network will be denied.

Question 8 of 164

Refer to the configuration output. Which of the following statements are correct regarding the configuration of the ACL on RTA? (Choose two).

    Correct Answer: AB

    Packets from network 172.16.1.1/32 will be denied because the rule explicitly denies the source address 172.16.1.1 with a wildcard mask of 0.0.0.0, which matches only that single IP address. Packets from network 172.16.1.0/24 will be denied because the rule also denies any source address in the 172.16.0.0/16 network with a wildcard mask of 0.255.0.0, which includes the entire 172.16.1.0/24 subnet.

Question 9 of 164

On Huawei switch, which of the following commands can be used to set port duplex mode as "auto negotiation"? (Choose two)

    Correct Answer: AC

    To set port duplex mode to auto negotiation on Huawei switches, the correct commands are 'duplex negotiation auto' and 'duplex auto'. These commands directly specify that the port should operate in auto negotiation mode, allowing the port to automatically negotiate the best duplex setting with connected devices. Other options do not explicitly set the port to auto negotiation mode.

Question 10 of 164

The network administrator wishes to transmit data between two end stations. The network interface cards of both devices operates at 100Mbps however one supports half duplex while the other uses full duplex mode.

What will occur as a result?

    Correct Answer: B

    When one end station operates in half-duplex mode and the other in full-duplex mode, communication is possible but there is a higher likelihood of collisions, especially when transmitting large amounts of data. This mismatch can lead to significant data loss due to retransmissions and errors, as half-duplex mode cannot handle simultaneous send and receive operations efficiently. Therefore, the end stations can communicate, but data may be lost during transmission of large amounts of traffic.