單項選擇題A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題A workgroup switch is configured with all ports assigned to VLAN 2. In addition,all ports are configured as full-duplex FastEthernet. What is the effect of adding switch ports to a new VLAN on this switch?()

A. The additions will create more collision domains.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.
E. The possibility that switching loops will occur will increase dramatically.

2.單項選擇題Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.

3.單項選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.

4.單項選擇題What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()

A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable

5.多項選擇題What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()

A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router

6.單項選擇題Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?()

A. Rollover cable
B. Console cab le
C. Crossover cable
D. Straight-through cable
E. Serial cable

7.多項選擇題You are experiencing intermittent issues relating to congestion with your network.What are the possible causes of congestion on a LAN?()

A. A broadcast domain with too many hosts.
B. Full duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Network Segmentation.
F. Low bandwidth.

10.多項選擇題

An administrator is configuring a Catalyst switch with VLAN information that must be automatically distributed to other Catalyst switches in the network.
What conditions must be met in order for the VLANs configured on this switch to be automatically configured on the other switches?()

A. The switch that will share its VLAN configuration must be in VTP server mode.
B. The switches must be in the same VTP domain.
C. The switch that will share the VLAN information must be configured as the root bridge.
D. The switches must be connected over VLAN trunks.
E. The switches must be configured to use the same STP version.
F. The switches must have VTP pruning activated.

最新試題

Which command is used to display the placement and direction of an IP access control list on a router?()

題型:單項選擇題

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

題型:單項選擇題

The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()

題型:單項選擇題

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

題型:單項選擇題

What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()

題型:單項選擇題

Which of the following contribute to congestion on an Ethernet network?()

題型:多項選擇題

What should the configuration register value be after successfully completing the password recover procedure and returning the router to normal operation? ()

題型:單項選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項選擇題

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

題型:多項選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項選擇題