A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
您可能感興趣的試卷
你可能感興趣的試題
A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer
A.RIP version 1 broadcasts updates whereas RIP version 2 uses multicasts.
B.RIP version 1 multicasts updates while RIP version 2 uses broadcasts.
C.Both RIP version 1 and RIP version 2 are classless routing protocols.
D.RIP Version 2 is a classless routing protocol whereas RIP version 1 is a classful routing protocol.
E.Both RIP version 1 and version 2 support authentication.
F.RIP version 2 sends the subnet mask in updates and RIP version 1 does not.
A.no VLANs
B.all VLANs
C.only VLANs 1 - 64
D.only the VLANs that are specified when creating the trunk
A.It creates a VLAN 999 interface.
B.It designates VLAN 999 for untagged traffic.
C.It blocks VLAN 999 traffic from passing on the trunk.
D.It designates VLAN 999 as the default for all unknown tagged traffic.
A.It checks the configuration register.
B.It attempts to boot from a TFTP server.
C.It loads the first image file in flash memory.
D.It inspects the configuration file in NVRAM for boot instructions.
A.packet switching
B.access layer security
C.path selection
D.VLAN membership assignment
E.bridging between LAN segments
F.microsegmentation of broadcast domains
A.session
B.transport
C.network
D.data link
E.physical
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
A.BSS
B.ESS
C.IBSS
D.SSID
A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM
最新試題
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
At which layer of the OSI model is RSTP used to prevent loops?()
Which statement is true, as relates to classful or classless routing?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
What is the purpose of the cisco Vlan Trunking protocol?()
Which command encrypts all plaintext passwords?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which pairing reflects a correct protocol-and-metric relationship?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()