Following a failure of services in the network, an administrator discovered that the configuration in one of the enterprise routers had been changed. What actions can be taken by the administrator to prevent further changes?
Answer : A, D
Comprehensive Explanation= To prevent unauthorized changes to the router's configuration, the administrator can take several steps. Configuring an ACL to restrict management access ensures that only authorized users, such as the administrator, can log in to the router. Additionally, using AAA (Authentication, Authorization, and Accounting) allows the administrator to manage user permissions and control access to the router's functions based on user roles. Port-security is used for limiting MAC addresses on switch ports, and login privilege levels should be set appropriately but not limited to level 0, which restricts almost all actions.
When a switch receives a unicast data frame, if the destination MAC address of the data frame can be found in the MAC address table of the switch, the data frame is definitely forwarded through the port corresponding to the MAC address.
Answer : B
While a switch will typically forward a unicast frame based on its MAC address table, certain scenarios like port security or VLAN restrictions may prevent the frame from being forwarded even if a MAC entry exists. (Reference: HCIA-Datacom Training Material, MAC Address Table and Frame Forwarding)
(An Eth-Trunk interface can be used only as a Layer 2 interface.)
Answer : B
Eth-Trunk Functionality:
An Eth-Trunk interface can operate as both a Layer 2 and Layer 3 interface depending on the configuration. For example:
As a Layer 2 interface, it can aggregate Ethernet links for switching.
As a Layer 3 interface, it can aggregate links for routing.
Correct Answer:
FALSE. Eth-Trunk interfaces can function as both Layer 2 and Layer 3 interfaces.
telnetlib is a module provided by Python to implement the Telnet protocol.
Answer : A
The telnetlib module in Python provides functions to interact with Telnet servers, allowing Python scripts to automate Telnet sessions. This module is widely used in network automation and scripting tasks, where Telnet is used to access and manage network devices remotely.
Which of the following network types are supported by OSPF?
Answer : A, B, C, D
Making a call on a landline telephone is a type of network communication.
Answer : A
Making a call on a landline telephone involves network communication. Though it uses a traditional telephone network (Public Switched Telephone Network, PSTN), the process of sending and receiving voice data through a wired system qualifies as network communication. The voice signals are converted into electrical signals, transmitted over the network, and then converted back into voice signals on the receiving end .
SWA and SWB run RSTP. Which of the following statements are true?
Answer : B, C, D
Comprehensive Explanation= In RSTP (Rapid Spanning Tree Protocol), G0/0/3 of SWB is an Alternate Port because it provides a redundant path to the root bridge, while G0/0/3 of SWA is a Designated Port, forwarding traffic away from the root bridge. Similarly, G0/0/2 of SWA is also a Designated Port because it forwards traffic to other segments of the network. Alternate Ports are used to provide backup paths, while Designated Ports are the forwarding ports on a given segment.