單項選擇題

You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.
 What supported authentication server should be chosen?()

A.TACACS with LEAP extensions
B.RADIUS with EAP extensions
C.TACACS+
D.LDAP


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

You work as a network engineer for . You study the switch exhibit carefully. 
Which two statements are true? ()
Exhibit:

A.The trust boundary is not on this switch.
B.It is displaying the AutoQos configuration that was initially applied.
C.Interface Fa0/3 trusts allCoS values.
D.The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E.The show auto qos command shows the user-defined QoS settings.
F.The show auto qos command does not display user configuration changes currently in effect.

2.多項選擇題Which three statements are true about DAI?()

A.DAI intercept all ARP packets on untrusted ports
B.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
C.DAI is used to prevent against a DHCP Snooping attack.
D.DAI forwards all ARP packets received on a trusted interface without any checks.
E.DAI forwards all ARP packets on untrusted ports.
F.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

3.多項選擇題Which two statements are true about trust boundaries?()

A.Classifying and marking traffic should be done as close to the traffic source as possible. 
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.

4.單項選擇題

Refer to the exhibit. 
What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()

A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1.

6.多項選擇題

Your boss, Miss ,is interested in CEF.
 What should you tell her? ()

A.The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
B.The adjacent table is derived from the ARP table.
C.The FIB table is derived from the IP routing table.
D.When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
E.CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
F.When the CEF TCAM table is full, packets are dropped.

7.單項選擇題

Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network. 
How do the switch ports handle the DHCP messages?()

A.Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.
B.Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.
C.Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP request only.
D.All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.

8.單項選擇題

Exhibit:

You work as a network administrator at. You study the exhibit carefully. 
Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on 1 goes down? ()

A.  2(config-if)#ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 200   2(config-if)#standby 1 ip 10.10.10.10
B.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 195   2(config-if)#standby 1 preempt   2(config-if)#standby 1 ip 10.10.10.10
C.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 190   2(config-if)#standby 1 ip 10.10.10.10   2(config-if)#standby 1 track interface fa 1/1
D.  2(config-if)# ip address 10.10.10.2 255.255.255.0   2(config-if)#standby 1 priority 200   2(config-if)#standby 1 preempt   2(config-if)#standby 1 ip 10.10.10.10   2(config-if)#standby 1 track interface fa 1/1

9.單項選擇題

You have configured the "config network webmode enable" command on a Cisco device. 
What is the purpose of this command? ()

A.To allow HTTP access to the WLAN controller
B.To allow SSH access to the CLI of the WLAN controller
C.To allow SSL access to the CLI of the WLAN controller
D.To allow HTTPS access to the WLAN controller
E.None of the other alternatives apply

10.單項選擇題Which statement is true about voice VLANs? ()

A.When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
B.The voice VLAN feature is enabled by default.
C.The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
D.The default CoS value is 1 for incoming voice and data traffic.

最新試題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題

Which three statements about STP timers are true?()

題型:多項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:單項選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題