A.The best match of the ACL entries will be used for granularity of control.
B.They use source IP information for matching operations.
C.They use source and destination IP information for matching operations.
D.They use source IP information along with protocol-type information for finer granularity of control.
您可能感興趣的試卷
你可能感興趣的試題
A.Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.
B.Enter the no switchport command to disable Layer 2 functionality at the interface level.
C.Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.
D.Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.
A.ease of IP address assignment versus use of external routers
B.redundancy from trunking between distribution layer switches
C.provides first-hop redundancy to clients
D.allows inter-VLAN communication without requiring complexity of routing protocols
You work as a network engineer for . You study the exhibit carefully.
What best describes the Cisco IOS IP SLA command and output in the exhibit?()
A.verifies which operation types have been enabled for IP SLA source
B.verifies which operation types have been enabled for IP SLA responder
C.verifies which operation types are supported in software
D.verifies enabled operation types that are not running
You work as a network engineer for. You study the exhibit carefully. Which of these is true based upon the output shown in the command?()
Exhibit:
A.The port has security enabled and has shut down due to a security violation.
B.The port is operational and has reached its configured maximum allowed number of MAC addresses.
C.The port will allow access for 11 MAC addresses in addition to the 3 configured MAC addresses.
D.If the number of devices attempting to access the port exceeds 11, the port will shut down for 20 minutes, as configured.
A.PACLs can be applied in the inbound or outbound direction of a Layer 2 physical interface.
B.At Layer 2, a MAC address PACL will take precedence over any existing Layer 3 PACL.
C.When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port.
D.PACLs are not supported on EtherChannel interfaces.
A.Configure the private VLAN port parameters.
B.Configure and map the secondary VLAN to the primary VLAN.
C.Disable IGMP snooping.
D.Set the VTP mode to transparent.
A.isolated
B.protected
C.private
D.associated
E.promiscuous
F.munity
A.enables PortFast
B.disables trunking
C.disables Cisco Discovery Protocol
D.enables port security
E.enables loopguard
F.disables EtherChannel
You are implementing basic switch security best practices.
Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A.Make all ports private VLAN ports.
B.Place all unused ports in native VLAN 1 until needed.
C.Proactively configure unused switch ports as access ports.
D.Disable Cisco Discovery Protocol globally.
Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information:
What conclusion can you infer from this information?()
A.VRRP is initializing and operating correctly.
B.HSRP is not properly exchanging three hello messages.
C.VRRP is not properly exchanging three hello messages.
D.HSRP is initializing and operating correctly.
E.GLBP is not properly exchanging three hello messages.
F.GLBP is initializing and operating correctly.
最新試題
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
During routine maintenance, it became necessary to shutdown G1/0/1 on DS1 and DS2. All other interface were up. During this time, DS1 became the active device for Vlan104’s HSRP group. As related to Vlan104’s HSRP group. What can be done to make the group function properly ? ()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Refer to the exhibit. Which statement is true about the output?()
Which statement is correct about RSTP port roles?()