單項選擇題

When you enable port security on an interface that is also configured with a voice VLAN, 
what is the maximum number of secure MAC addresses that should be set on the port?()

A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured. 
E.No more than two secure MAC addresses should be set.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()

A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port)

2.單項選擇題What is an important step to take when verifying a newly proposed network security solution? ()

A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.

3.單項選擇題What is needed to verify that a newly implemented security solution is performing as expected? ()

A.a detailed physical and logical topology
B.a cost analysis of the implemented solution 
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution

4.單項選擇題What action should you be prepared to take when verifying a security solution?()

A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

5.多項選擇題When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates

最新試題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項選擇題

Which three statements about STP timers are true?()

題型:多項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()

題型:多項選擇題

Which statement is correct about RSTP port roles?()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項選擇題