單項選擇題Why would a network administrator configure port security on a switch?()

A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

A.permit all packets matching the first three octets of the source address to all destinations
B.permit all packets matching the last octet of the destination address and accept all source addresses
C.permit all packets from the third subnet of the network address to all destinations
D.permit all packets matching the host bits in the source address to all destinations
E.permit all packets to destinations matching the first three octets in the destination address

2.單項選擇題A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge?()

A.Establish a direct link from the switch to all other switches in the network.
B.Assign the switch a higher MAC address than the other switches in the network have.
C.Configure the switch so that it has a lower priority than other switches in the network.
D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.
E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

3.單項選擇題What is the purpose of the command shown below? vtp password Fl0r1da()。

A.It is used to validate the sources of VTP advertisements sent between switches.
B.It is used to access the VTP server to make changes to the VTP configuration.
C.It allows two VTP servers to exist in the same domain, each configured with different passwords.
D.It is the password required when promoting a switch from VTP client mode to VTP server mode.
E.It is used to prevent a switch newly added to the network from sending incorrect VLAN information to the other switches in the domain.

4.多項選擇題What are two reasons a network administrator would use CDP? (Choose two.)()

A.to verify the type of cable interconnecting two devices
B.to determine the status of network services on a remote device
C.to obtain VLAN information from directly connected switches
D.to verify Layer 2 connectivity between two devices when Layer 3 fails
E.to obtain the IP address of a connected device in order to telnet to the device
F.to determine the status of the routing protocols between directly connected routers

5.單項選擇題Why will a switch never learn a broadcast address?()

A.Broadcasts only use network layer addressing.
B.A broadcast frame is never forwarded by a switch.
C.A broadcast address will never be the source address of a frame.
D.Broadcast addresses use an incorrect format for the switching table.
E.Broadcast frames are never sent to switches.

6.單項選擇題Which additional configuration step is necessary in order to connect to an access point that has SSID broadcasting disabled?()

A.Set the SSID value in the client software to public.
B.Configure open authentication on the AP and the client.
C.Set the SSID value on the client to the SSID configured on the AP
D.Configure MAC address filtering to permit the client to connect to the AP

8.單項選擇題A router receives information about network 192.168.10.0/24 from multiple sources. What will the router consider the most reliable information about the path to that network?()

A.a directly connected interface with an address of 192.168.10.254/24
B.a static route to network 192.168.10.0/24
C.a RIP update for network 192.168.10.0/24
D.an OSPF update for network 192.168.0.0/16
E.a default route with a next hop address of 192.168.10.1
F.a static route to network 192.168.10.0/24 with a local serial interface configured as the next hop

9.多項選擇題Which of the following describes the roles of devices in a WAN? (Choose three.)()

A.A CSU/DSU terminates a digital local loop.
B.A modem terminates a digital local loop.
C.A CSU/DSU terminates an analog local loop.
D.A modem terminates an analog local loop.
E.A router is commonly considered a DTE device.
F.A router is commonly considered a DCE device.

10.多項選擇題Which of the following statements are true regarding bridges and switches? (Choose 3.)()

A.Switches are primarily software based while bridges are hardware based.
B.Both bridges and switches forward Layer 2 broadcasts.
C.Bridges are frequently faster than switches.
D.Switches have a higher number of ports than most bridges.
E.Bridges define broadcast domains while switches define collision domains.
F.Both bridges and switches make forwarding decisions based on Layer 2 addresses.

最新試題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項選擇題

How are VTP advertisements delivered to switches across the network?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題