网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

In which Spanning-Tree states does a switch port learn MAC addresses?()

  • A、Blocking
  • B、Listening
  • C、Forwarding
  • D、Learning
  • E、Relaying

参考答案

更多 “In which Spanning-Tree states does a switch port learn MAC addresses?()A、BlockingB、ListeningC、ForwardingD、LearningE、Relaying” 相关考题
考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above

考题 In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)A.BlockingB.ListeningC.ForwardingD.LearningE.Relaying

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 Which two states are the port states when RSTP has converged?() A.blockingB.learningC.disabledD.forwardingE.listening

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?() A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost

考题 A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard

考题 What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security

考题 Which two states are the port states when RSTP has converged?()A、blockingB、learningC、discardingD、forwardingE、listening

考题 Which three port states are used by RSTP 802.1w?()A、ListeningB、LearningC、ForwardingD、BlockingE、DiscardingF、Disabled

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()A、BlockingB、AutoC、DesirableD、OnE、TransparentF、Learning

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 多选题A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()AUplink Ethernet ports or border portsBAppliance portsCServer portsDFabric portsEBackplane portsFvEth interfacesGA Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

考题 单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A  Spanning tree protectB  Root Guard and BPDU GuardC  Unicast Reverse Path ForwardingD  MAC spoof guardE  Port Security

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E path cost

考题 单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A The port’s violation mode is set to restrictB The port is shut downC The MAC address table is cleared and the new MAC address is entered into the tableD The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC addressC VTP revision numberD highest port priority numberE path cost

考题 单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A path costB lowest port MAC addressC VTP revision numberD highest port priority numberE port priority number and MAC address

考题 多选题In which Spanning-Tree states does a switch port learn MAC addresses?()ABlockingBListeningCForwardingDLearningERelaying