單項選擇題What is valid reason for a switch to deny port access to new devices when port security is enabled?()

A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the purpose using the traceroute command?()

A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.

2.單項選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

3.單項選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

4.單項選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.

5.單項選擇題How does using the service password encryption command on a router provide additional security? ()

A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router

最新試題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題