多項(xiàng)選擇題Private VLANS can be configured as which three of these port types?()

A.isolated
B.protected
C.private
D.associated
E.promiscuous
F.munity


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What are three results of issuing the switchport host command? ()

A.enables PortFast
B.disables trunking
C.disables Cisco Discovery Protocol
D.enables port security
E.enables loopguard
F.disables EtherChannel

2.單項(xiàng)選擇題

You are implementing basic switch security best practices. 
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()

A.Make all ports private VLAN ports.
B.Place all unused ports in native VLAN 1 until needed.
C.Proactively configure unused switch ports as access ports.
D.Disable Cisco Discovery Protocol globally.

3.單項(xiàng)選擇題

Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:

What conclusion can you infer from this information?()

A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages. 
F.GLBP is initializing and operating correctly.

4.單項(xiàng)選擇題



You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. 
What is the most likely cause of this status?()

A.this is normal operation
B.IP addressing is incorrect
C.standby group number does not match VLAN number
D.incorrect standby timers
E.incorrect priority commands

6.單項(xiàng)選擇題

You work as a network engineer for . You study the exhibit carefully. From the configuration shown, 
what can be determined?()
Exhibit:

A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.

7.單項(xiàng)選擇題

When you enable port security on an interface that is also configured with a voice VLAN, 
what is the maximum number of secure MAC addresses that should be set on the port?()

A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured. 
E.No more than two secure MAC addresses should be set.

8.單項(xiàng)選擇題When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)

9.單項(xiàng)選擇題What is an important step to take when verifying a newly proposed network security solution? ()

A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.

10.單項(xiàng)選擇題What is needed to verify that a newly implemented security solution is performing as expected? ()

A.a detailed physical and logical topology
B.a cost analysis of the implemented solution 
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution

最新試題

Refer to the exhibit. Which statement is true about the output?()

題型:單項(xiàng)選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項(xiàng)選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()

題型:單項(xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項(xiàng)選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:單項(xiàng)選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項(xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題