Appleトレーニング Widgetについてアップル認定トレーニングの最新の開催スケジュールをいつでも検索できる便利なウィジェットです。基礎コースから上級コースまで、アップル公認トレーニングセンターで開催されるすべてのトレーニングコースを網羅しています。ご自身にぴったりのコースを簡単に瞬時に検索でき、リンクから申込みもできます。スキルアップのためにアップル認定トレーニングを受講し、ACHDS、ACTC、ACSA認定資格をめざしましょう。
Server Essentials 10.5
認証の9L0-509
試験問題集を挙げて、皆と一緒に勉強しましょう
6.Which two locations can be configured as a source for the IOS image in the boot system command?
(Choose two.)
A.RAM
B.NVRAM
C.flash memory
D.HTTP server
E.TFTP server
F.Telnet server
Answer:C E
7.Which of the following IP addresses fall into the CIDR block of 115.64.4.0/22? (Choose three.)
A.115.64.8.32
B.115.64.7.64
C.115.64.6.255
D.115.64.3.255
E.115.64.5.128
F.115.64.12.128
Answer:B C E
8.A network administrator must configure 200 switch ports to accept traffic from only the currently
attached host devices. What would be the most efficient way to configure MAC-level security on all these
ports?
A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security
mac-address command.
B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security
mac-address command.
C.Use the switchport port-security MAC address sticky command on all the switch ports that have end
devices connected to them.
D.Use show mac-address-table to determine the addresses that are associated with each port and then
enter the commands on each switch for MAC address port-security.
Answer:C
14.To configure the VLAN trunking protocol to communicate VLAN information between two switches,
what two requirements must be met? (Choose two.)
A.Each end of the trunk line must be set to IEEE 802.1E encapsulation.
B.The VTP management domain name of both switches must be set the same.
C.All ports on both the switches must be set as access ports.
D.One of the two switches must be configured as a VTP server.
E.A rollover cable is required to connect the two switches together.
F.A router must be used to forward VTP traffic between VLANs.
Answer:B D
15.What are three IPv6 transition mechanisms? (Choose three.)
A.6to4 tunneling
B.VPN tunneling
C.GRE tunneling
D.ISATAP tunneling
E.PPP tunneling
F.Teredo tunneling
Answer:A D F
16.Which of the following correctly describe steps in the OSI data encapsulation process? (Choose two.)
A.The transport layer divides a data stream into segments and may add reliability and flow control
information.
B.The data link layer adds physical source and destination addresses and an FCS to the segment.
C.Packets are created when the network layer encapsulates a frame with source and destination
D.Packets are created when the network layer adds Layer 3 addresses and control information to a
segment.
E.The presentation layer translates bits into voltages for transmission across the physical link.
Answer:A D
17.What functions do routers perform in a network? (Choose two.)
A.packet switching
B.access layer security
C.path selection
D.VLAN membership assignment
E.bridging between LAN segments
F.microsegmentation of broadcast domains
Answer:A C