网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()

  • A、Create an additional ACL to block the access to VLAN 1.
  • B、Move the management VLAN to something other than default.
  • C、Move all ports to another VLAN and deactivate the default VLAN.
  • D、Limit the access in the switch using port security configuration.
  • E、Use static VLAN in trunks and access ports to restrict connections.
  • F、Shutdown all unused ports in the Catalyst switch.

参考答案

更多 “By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.” 相关考题
考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A. using DHCP snoopingB. snooping the incoming 802.1Q VLAN tagC. using CDPD. snooping the CoS marking on the incoming frames

考题 After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network,how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port?()A、by snooping the CoS marking on the incoming framesB、by using RTP hello messages between the switch port and the Cisco IP PhoneC、by using CDPD、by using DHCP snoopingE、by snooping the incoming 802.1Q VLAN tag

考题 After configuring FabricPath, the following appears in the syslog:  %STP-2-L2GW_BACKBONE_BLOCK: L2 Gateway Backbone port inconsistency blocking port port-channel100 on VLAN0010.  What is the cause of this message? ()      A、 STP must be disabled; message indicates that STP is enabled.B、 STP is misconfigured; root guard must be disabled.C、 An inferior BPDU is received on a Cisco FabricPath edge port.D、 A superior BPDU is received on a Cisco FabricPath edge port.

考题 What is the effect of applying the switchport trunk encapsulation dot1q command to a port on a Cisco Catalyst switch?()A、By default, native VLAN packets going out this port will be tagged.B、Without an encapsulation command, 802.1Q will be the default encapsulation if DTP fails to negotiate a trunking protocol.C、The interface will support the reception of tagged and untagged traffic.D、If the device connected to this port is not 802.1Q-enabled, it will not be able to handle 802.1Q packets.

考题 When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()A、Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.B、Enter the no switchport command to disable Layer 2 functionality at the interface level.C、Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.D、Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.

考题 What interface is created when an FC Port Channel is created on a Cisco Unified Computing System?()A、 An interface ’san-port-channel’ in NXOSB、 An interface ’port-channel’ in NXOSC、 An interface ’port-channel’ with ’mode fc’ configuredD、 An interface ’fc-port-channel’ in NXOS

考题 Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()A、 Port priority value can be configured between 1 and 65535.B、 A higher port priority value means a higher priority of LACP.C、 Port priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.D、 LACP uses the port priority with the port number to form the port identifier.E、 LACP Port priority default value should always be changed

考题 The Cisco 6100 XP Fabric Interconnect is available in Which two configurations?()A、20 port+expansion moduleB、24 port+expansion moduleC、40 port+expansion moduleD、48 port+expansion module

考题 You need to configure a new Cisco router to be installed in the VOIP network. Which threeinterface commands will configure the switch port to support a connected Cisco phone and to trustthe CoS values received on the port if CDP discovers that a Cisco phone is attached?()A、switchport voice vlan vlan-idB、mls qos trust device cisco-phoneC、switchport priority extend cos_valueD、mls qos trust cosE、mls qos trust override cos

考题 To initiate testing,  which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()A、UDP port 2020B、UDP port 1967C、TCP port 2020D、ICMP port 1967

考题 he Cisco Nexus 1000V Series Switches are virtual machine access switches that are an intelligent software switch implementation for VMware vSphere environments running the Cisco NX-OS Software operating system. Together with the VMware ESX hypervisor, the Nexus 1000V supports Cisco VN-Link server virtualization technology, which provides mobile virtual machine security and network policy for VMware View components, including the DHCP snooping feature. DHCP snooping is disabled on the Nexus 1000V by default. When the DHCP snooping feature is enabled on the Nexus 1000V, what are the default trust settings for the vEthernet and uplink ports?() A、 All vEthernet ports are trusted, and all Ethernet ports such as uplinks and port channels are trusted.B、 All vEthernet ports are not trusted, and all Ethernet ports such as uplinks and port channels are not trusted.C、 All vEthernet ports are trusted and all Ethernet ports such as uplinks and port channels are not trusted.D、 All vEthernet ports are not trusted and all Ethernet ports such as uplinks and port channels are trusted.

考题 Which statement describes Reverse Route Injection (RRI)?()A、A static route that points towards the Cisco Easy VPN server is created on the remote client.B、A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C、A default route is injected into the route table of the remote client.D、A default route is injected into the route table of the Cisco Easy VPN server.

考题 As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()A、using DHCP snoopingB、snooping the incoming 802.1Q VLAN tagC、using CDPD、snooping the CoS marking on the incoming frames

考题 Which two Fibre Channel features are not supported in Cisco Nexus 5500 and Nexus 5000 platforms? ()A、 port securityB、 fabric bindingC、 IVRD、 port trackingE、 FICON

考题 When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 Which statement is true when logging in using the WebUI? ()A、Port 80 for HTTP is enabled by default.B、Port 443 for HTTPS is enabled by default.C、Port 8090 for HTTP is enabled by default.D、Both HTTP and HTTPS are enabled using their standard port values.

考题 多选题Each port that is configured to use LACP has an LACP port priority. Which statements are true about LACP port priority? ()APort priority value can be configured between 1 and 65535.BA higher port priority value means a higher priority of LACP.CPort priority can be configured so that specific links can be chosen as active links rather than the hot standby links within the port channel.DLACP uses the port priority with the port number to form the port identifier.ELACP Port priority default value should always be changed

考题 单选题Which statement describes Reverse Route Injection (RRI)?()A A static route that points towards the Cisco Easy VPN server is created on the remote client.B A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.C A default route is injected into the route table of the remote client.D A default route is injected into the route table of the Cisco Easy VPN server.

考题 单选题When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()A Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.B Enter the no switchport command to disable Layer 2 functionality at the interface level.C Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.D Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.

考题 多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.

考题 多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题When you enter the interface command auto qos voip cisco-phone on a port at the edge of a network, how does the Cisco Catalyst switch detect if a Cisco IP Phone is connected to the port? ()A by snooping the CoS marking on the incoming framesB by using RTP hello messages between the switch port and the Cisco IP PhoneC by using CDPD by using DHCP snoopingE by snooping the incoming 802.1Q VLAN tag

考题 单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A The port’s violation mode is set to restrictB The port is shut downC The MAC address table is cleared and the new MAC address is entered into the tableD The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 单选题What is the effect of applying the switchport trunk encapsulation dot1q command to a port on a Cisco Catalyst switch?()A By default, native VLAN packets going out this port will be tagged.B Without an encapsulation command, 802.1Q will be the default encapsulation if DTP fails to negotiate a trunking protocol.C The interface will support the reception of tagged and untagged traffic.D If the device connected to this port is not 802.1Q-enabled, it will not be able to handle 802.1Q packets.