网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
A

Port security can be configured for ports supporting VoIP.

B

With port security configured, four MAC addresses are allowed by default.

C

The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

D

  Withsecurity configured, only one MAC addresses is allowed by default.

E

Port security cannot be configured for ports supporting VoIP.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.” 相关考题
考题 Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators‘ computers run Windows 7. You need to ensure the RDP connections are as secure as possible.Which two actions should you perform?()A. Set the security layer for each server to the RDP Security Layer.B. Configure the firewall on each server to block port 3389.C. Acquire user certificates from the internal certification authority.D. Configure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?() A.Local Security PolicyB.ScwC.SeceditD.Services console

考题 Which set of commands is recommended to prevent the use of a hub in the access layer?() A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

考题 Which set of commands is recommended to prevent the use of a hub in the access layer?()A、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C、switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D、switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interfacE.If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? ()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()A、Duplex mode selectionsB、Auto MDIX selectionsC、Status SelectionsD、Group mode selectionsE、Port security selections

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()A、Setup an ACL that allows and logs all IP traffic between the two computersB、Configure a spanning tree to check for a loopC、Setup a span port on the switch to watch for CRC errorsD、Connect both computers using a crossover cable

考题 You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()A、 SVI interfaceB、 Access portC、 EtherChannel port channelD、 Loopback interfaceE、 Routed portF、 BVI interface

考题 Which of the following should you enable to prevent a switch from forwarding packets with source  addresses that are outside an administratively defined group? ()A、 DAIB、 STPC、 PVLAND、 port security

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 You need to configure a new Cisco router to be installed in the VOIP network. Which threeinterface commands will configure the switch port to support a connected Cisco phone and to trustthe CoS values received on the port if CDP discovers that a Cisco phone is attached?()A、switchport voice vlan vlan-idB、mls qos trust device cisco-phoneC、switchport priority extend cos_valueD、mls qos trust cosE、mls qos trust override cos

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()A、TestKing1(config-if)# switchport port-security maximum 1B、TestKing1(config)# mac-address-table secureC、TestKing1(config)# access-list 10 permit ip hostD、TestKing1(config-if)# switchport port-security violation shutdownE、TestKing1(config-if)# ip access-group 10

考题 You need to configure a new Company switch to support DTP.  Which DTP switchport mode  parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A、 AccessB、 No negotiateC、 TrunkD、 Dynamic desirableE、 Dynamic autoF、 None of the other alternatives apply

考题 The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport p ort-security violation shutdownE、Switch1(config-if)# ip access-group 10

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 You need to configure a new Cisco router to be installed in the Company VOIP network.  Which  three interface commands will configure the switch port to support a connected Cisco phone and  to trust the CoS values received on the port if CDP discovers that a Cisco phone is attached? ()A、switchport voice vlan vlan-idB、mls qos trust device cisco-phoneC、switchport priority extend cos_valueD、mls qos trust cosE、mls qos trust override cos

考题 You need to configure the security settings for the new app servers. Which two actions should you perform?()A、Create a Group policy object (GPO) for the web servers.B、Create a Group policy object (GPO) for the database servers.C、Modify the Default Domain Policy.D、Modify the Default Domain Controllers Policy.

考题 多选题You have configured voice VLANs on Catalyst switch R1.  Which two statements are true about the  operation of voice VLANs on this device? ()AWhen the voice VLAN feature is enabled, all untagged traffic is sent according to the default  CoS priority of the port.BEnabling voice VLANs enables the switch to create multiple queues for traffic that is entering a  port.CWhen voice VLANs are configured on a trunk link, UplinkFast must also be enabled.DVoice VLANs are configured to enable the switch to forward frames marked with the proper  CoS values over separate physical links.EEnabling voice VLANs enables the switch to forward frames with a specific 802.1P marking.

考题 单选题You need to configure a new Company switch to support DTP.  Which DTP switchport mode  parameter sets the switch port to actively send and respond to DTP negotiation frames? ()A  AccessB  No negotiateC  TrunkD  Dynamic desirableE  Dynamic autoF  None of the other alternatives apply

考题 多选题The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。ASwitch1(config-if)# switchport port-security maximum 1BSwitch1(config)# mac-address-table secureCSwitch1(config)# access-list 10 permit ip hostDSwitch1(config-if)# switchport port-security violation shutdownESwitch1(config-if)# ip access-group 10

考题 单选题Your network contains a server that has the SNMP Service installed.You need to configure the SNMP security settings on the server.Which tool should you use?()A Local Security PolicyB ScwC SeceditD Services console

考题 多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface

考题 单选题Which of the following should you enable to prevent a switch from forwarding packets with source  addresses that are outside an administratively defined group? ()A  DAIB  STPC  PVLAND  port security