网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which configuration is used to enable root guard?()
A

interface gig3/1  spanning-tree guard root

B

interface gig3/1  spanning-tree root guard

C

interface gig3/1  spanning-tree root-guard

D

interface gig3/1  spanning-tree root-guard default


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which configuration is used to enable root guard?()A interface gig3/1 spanning-tree guard rootB interface gig3/1 spanning-tree root guardC interface gig3/1 spanning-tree root-guardD interface gig3/1 spanning-tree root-guard default” 相关考题
考题 Which CLI mode allows you to make configuration changes?() A. enable modeB. configuration modeC. operational modeD. active mode

考题 The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

考题 Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

考题 Which of the following settings will reduce packet overhead and overall latency in a standalonepoint-to-point bridge deployment?()A、enable concatenation on the non-root bridge onlyB、enable concatenation on the root bridge onlyC、enable concatenation on both the root bridge and non-root bridgeD、enable concatenation on the root bridge and set it as desirable on the non-root bridgeE、set concatenation as desirable on the root bridge and enable it on the non-root bridge

考题 Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()A、Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.B、UDLD protects against STP failures caused by cabling problems that create one-way links.C、Loop guard detects and protects against duplicate packets being received and transmitted on different ports.D、UDLD protects against unidirectional cabling problems on copper and fiber media.E、Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

考题 The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply

考题 If a port configured with STP loop guard stops receiving BPDUs, the port will be put into which state?()A、learning stateB、listening stateC、forwarding stateD、root-inconsistent state

考题 Which two statements correctly describe characteristics of the PortFast feature? ()A、STP will be disabled on the port.B、PortFast can also be configured on trunk ports.C、PortFast is required to enable port-based BPDU guard.D、PortFast is used for both STP and RSTP host ports.E、PortFast is used for STP-only host ports.

考题 Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A、 su B、 su root C、 su - root D、 su -c "root"

考题 Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

考题 You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

考题 Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()A、The port must be put into forwarding state manually after root-inconsistent state has beencorrectedB、A Root Guard port receiving superior BPDU goes into a root-inconsistent stateC、A Root Guard port receiving inferior BPDU goes into a root-inconsistent stateD、While the port is in a root-inconsistent state no user data is sent across that portE、The port returns to a forwarding state if inferior BPDUs stopF、It should be applied to all switch ports

考题 After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.

考题 Which administration tool is used to enable or disable the logging and tracing of WebSphere Commerce components?()A、Configuration ManagerB、WebSphere Application Server Administrative ConsoleC、WebSphere Commerce Administration consoleD、Store ServicesE、WebSphere Commerce Accelerator

考题 Which of the following methods can be used to enable/disable the Commerce Payments CustomOffline cassette?()A、From WebSphere Commerce Configuration ManagerB、By updating the ENABLED column in the CASSETTES tableC、By running the ’configureCassette’ commandD、From WebSphere Commerce Administration ConsoleE、From WebSphere Commerce Payments User Interface

考题 Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

考题 Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable

考题 单选题Which statement is true about loop guard?()A Loop guard only operates on interfaces that are considered point-to-point by the spanning tree.B Loop guard only operates on root ports.C Loop guard only operates on designated ports.D Loop guard only operates on edge ports.

考题 多选题Which three steps are parts of the root password recovery process?()AReboot the deviceBRun the recovery scriptCReset the root passwordDReset the user passwordsELoad factory-default configuration

考题 多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

考题 单选题The enable secret command is used to secure access to which CLI mode?()A user EXEC modeB global configuration modeC privileged EXEC modeD auxiliary setup mode

考题 单选题Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A  su B  su root C  su - root D  su -c root

考题 多选题Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()AThe port must be put into forwarding state manually after root-inconsistent state has beencorrectedBA Root Guard port receiving superior BPDU goes into a root-inconsistent stateCA Root Guard port receiving inferior BPDU goes into a root-inconsistent stateDWhile the port is in a root-inconsistent state no user data is sent across that portEThe port returns to a forwarding state if inferior BPDUs stopFIt should be applied to all switch ports

考题 多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.

考题 多选题After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()AIf a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.BEnable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.CConfigure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.DSet the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.EDisable all unused ports and place them in an unused VLAN to avoid unauthorized access.

考题 多选题Which of the following methods can be used to enable/disable the Commerce Payments CustomOffline cassette?()AFrom WebSphere Commerce Configuration ManagerBBy updating the ENABLED column in the CASSETTES tableCBy running the ’configureCassette’ commandDFrom WebSphere Commerce Administration ConsoleEFrom WebSphere Commerce Payments User Interface

考题 单选题The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B BPDU guard can guarantee proper selection of the root bridge.C BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E None of the other alternatives apply