單項(xiàng)選擇題

You work as a network engineer for . You study the exhibit carefully. From the configuration shown, 
what can be determined?()
Exhibit:

A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

When you enable port security on an interface that is also configured with a voice VLAN, 
what is the maximum number of secure MAC addresses that should be set on the port?()

A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured. 
E.No more than two secure MAC addresses should be set.

2.單項(xiàng)選擇題When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)

3.單項(xiàng)選擇題What is an important step to take when verifying a newly proposed network security solution? ()

A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.

4.單項(xiàng)選擇題What is needed to verify that a newly implemented security solution is performing as expected? ()

A.a detailed physical and logical topology
B.a cost analysis of the implemented solution 
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution

5.單項(xiàng)選擇題What action should you be prepared to take when verifying a security solution?()

A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

最新試題

Which statement is correct about RSTP port roles?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:?jiǎn)雾?xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:?jiǎn)雾?xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:?jiǎn)雾?xiàng)選擇題