网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
In which Spanning-Tree states does a switch port learn MAC addresses?()
- A、Blocking
- B、Listening
- C、Forwarding
- D、Learning
- E、Relaying
参考答案
更多 “In which Spanning-Tree states does a switch port learn MAC addresses?()A、BlockingB、ListeningC、ForwardingD、LearningE、Relaying” 相关考题
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above
考题
In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)A.BlockingB.ListeningC.ForwardingD.LearningE.Relaying
考题
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
考题
Which two states are the port states when RSTP has converged?()
A.blockingB.learningC.disabledD.forwardingE.listening
考题
A network administrator needs to configure port security on a switch.which two statements are true? ()
A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?()
A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
考题
After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost
考题
A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state, which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard
考题
What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address
考题
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security
考题
Which two states are the port states when RSTP has converged?()A、blockingB、learningC、discardingD、forwardingE、listening
考题
Which three port states are used by RSTP 802.1w?()A、ListeningB、LearningC、ForwardingD、BlockingE、DiscardingF、Disabled
考题
What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost
考题
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security
考题
When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()A、BlockingB、AutoC、DesirableD、OnE、TransparentF、Learning
考题
You need to configure port security on switch R1. Which two statements are true about this technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default. E、 Port security cannot be configured for ports supporting VoIP.
考题
多选题A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()AUplink Ethernet ports or border portsBAppliance portsCServer portsDFabric portsEBackplane portsFvEth interfacesGA Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.
考题
单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A
Spanning tree protectB
Root Guard and BPDU GuardC
Unicast Reverse Path ForwardingD
MAC spoof guardE
Port Security
考题
多选题You need to configure port security on switch R1. Which two statements are true about this technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC address.C
VTP revision numberD
highest port priority number.E
path cost
考题
单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A
The port’s violation mode is set to restrictB
The port is shut downC
The MAC address table is cleared and the new MAC address is entered into the tableD
The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out
考题
单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A
lowest port MAC addressB
port priority number and MAC addressC
VTP revision numberD
highest port priority numberE
path cost
考题
单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A
path costB
lowest port MAC addressC
VTP revision numberD
highest port priority numberE
port priority number and MAC address
考题
多选题In which Spanning-Tree states does a switch port learn MAC addresses?()ABlockingBListeningCForwardingDLearningERelaying
热门标签
最新试卷