多項選擇題The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)()

A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Why does the data communication industry use the layered OSI reference model? (Choose two.)()

A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.

4.多項選擇題The OSPF Hello protocol performs which of the following tasks? (Choose two.)()

A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF

5.多項選擇題A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

6.多項選擇題At which layers of the OSI model do WANs operate? (Choose two.)()

A.application layer
B.session layer
C.transport layer
D.network layer
E.datalink layer
F.physical layer

7.多項選擇題Which three statements describe the differences between RIP version 1 and RIP version 2? (Choose three.)()

A.RIP version 1 broadcasts updates whereas RIP version 2 uses multicasts.
B.RIP version 1 multicasts updates while RIP version 2 uses broadcasts.
C.Both RIP version 1 and RIP version 2 are classless routing protocols.
D.RIP Version 2 is a classless routing protocol whereas RIP version 1 is a classful routing protocol.
E.Both RIP version 1 and version 2 support authentication.
F.RIP version 2 sends the subnet mask in updates and RIP version 1 does not.

8.單項選擇題When a new trunk is configured on a 2950 switch, which VLANs by default are allowed over the trunk link?()

A.no VLANs
B.all VLANs
C.only VLANs 1 - 64
D.only the VLANs that are specified when creating the trunk

9.單項選擇題What is the function of the command switchport trunk native vlan 999 on a Cisco Catalyst switch?()

A.It creates a VLAN 999 interface.
B.It designates VLAN 999 for untagged traffic.
C.It blocks VLAN 999 traffic from passing on the trunk.
D.It designates VLAN 999 as the default for all unknown tagged traffic.

10.單項選擇題A Cisco router is booting and has just completed the POST process. It is now ready to find and load an IOS  image. What function does the router perform next?()

A.It checks the configuration register.
B.It attempts to boot from a TFTP server.
C.It loads the first image file in flash memory.
D.It inspects the configuration file in NVRAM for boot instructions.

最新試題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

Which statement is true, as relates to classful or classless routing?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題