A network administrator needs to configure port security on a switch.which two statements are true? ()A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac a

题目
A network administrator needs to configure port security on a switch.which two statements are true? ()

A.The network administrator can apply port security to dynamic access ports

B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

D.The network administrator can apply port security to EtherChannels.

E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.


相似考题
更多“A network administrator needs to configure port security on a switch.which two statements are true? () ”相关问题
  • 第1题:

    Which two statements about the use of VLANs to segment a network are true?()

    A. VLANs increase the size of collision domains.

    B. VLANs allow logical grouping of users by function.

    C. VLANs simplify switch administration.

    D. VLANs enhance network security.


    参考答案:B, D

  • 第2题:

    Why would a network administrator configure port security on a switch?()

    • A、To prevent unauthorized Telnet access to a switch port.
    • B、To limit the number of Layer 2 broadcasts on a particular switch port.
    • C、To prevent unauthorized hosts from accessing the LAN.
    • D、To protect the IP and MAC address of the switch and associated ports.
    • E、To block unauthorized access to the switch management interfaces over common TCP ports.

    正确答案:C

  • 第3题:

    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。

    • A、Configure port Fa0/1 to accept connections only from the static IP address of the server.
    • B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
    • C、Configure the MAC address of the server as a static entry associated with port Fa0/1.
    • D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
    • E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
    • F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

    正确答案:C,E

  • 第4题:

    An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()

    • A、Setup an ACL that allows and logs all IP traffic between the two computers
    • B、Configure a spanning tree to check for a loop
    • C、Setup a span port on the switch to watch for CRC errors
    • D、Connect both computers using a crossover cable

    正确答案:D

  • 第5题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第6题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第7题:

    The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

    • A、TestKing1(config-if)# switchport port-security maximum 1
    • B、TestKing1(config)# mac-address-table secure
    • C、TestKing1(config)# access-list 10 permit ip host
    • D、TestKing1(config-if)# switchport port-security violation shutdown
    • E、TestKing1(config-if)# ip access-group 10

    正确答案:A,D

  • 第8题:

    Which two statements about the use of VLANs to segment a network are true? ()

    • A、VLANs increase the size of collision domains.
    • B、VLANs allow logical grouping of users by function.
    • C、VLANs simplify switch administration.
    • D、VLANs enhance network security.

    正确答案:B,D

  • 第9题:

    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

    • A、 PAT
    • B、 ACLs
    • C、 Subnet masking
    • D、 Port blocking

    正确答案:B

  • 第10题:

    单选题
    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()
    A

     PAT

    B

     ACLs

    C

     Subnet masking

    D

     Port blocking


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
    A

    The host needs to open the telnet port.

    B

    The host needs a route for the translated address.

    C

    The administrator must use a proxy-arp policy for the translated address.

    D

    The administrator must use a security policy, which will allow communication between the zones.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

    A.

    B.

    C.

    D.


    参考答案:B

  • 第14题:

    Which two statements about the wireless control system (WCS) are true?()

    • A、the Cisco WCS is designed to support 1500 Cisco WLAN controllers and up to 50 APs
    • B、the Cisco WCS runs on a dedicated network device such as the Cisco 2700 network appliance
    • C、the Cisco WCS runs on various windows and Linux platforms
    • D、the Cisco WCS screen displays four main menu sheet tab consisting of Monitor, Configure, Security, and Alam
    • E、the Cisco WCS uses the SNMP protocol to communicate with the controllers

    正确答案:C,E

  • 第15题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第16题:

    The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。

    • A、Switch1(config-if)# switchport port-security maximum 1
    • B、Switch1(config)# mac-address-table secure
    • C、Switch1(config)# access-list 10 permit ip host
    • D、Switch1(config-if)# switchport port-security violation shutdown
    • E、Switch1(config-if)# ip access-group 10

    正确答案:A,D

  • 第17题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

    正确答案:C

  • 第18题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第19题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第20题:

    A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()

    • A、CAT3 cable
    • B、Serial cable
    • C、Crossover cable
    • D、Rollover cable

    正确答案:C

  • 第21题:

    You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()

    • A、Configure a WMI event trigger.
    • B、Configure a Network Monitor capture filter.
    • C、Configure a Network Monitor trigger.
    • D、Configure a System Monitor alert.

    正确答案:C

  • 第22题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第23题:

    多选题
    The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
    A

    Switch1(config-if)# switchport port-security maximum 1

    B

    Switch1(config)# mac-address-table secure

    C

    Switch1(config)# access-list 10 permit ip host

    D

    Switch1(config-if)# switchport p ort-security violation shutdown

    E

    Switch1(config-if)# ip access-group 10


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements about the wireless control system (WCS) are true?()
    A

    the Cisco WCS is designed to support 1500 Cisco WLAN controllers and up to 50 APs

    B

    the Cisco WCS runs on a dedicated network device such as the Cisco 2700 network appliance

    C

    the Cisco WCS runs on various windows and Linux platforms

    D

    the Cisco WCS screen displays four main menu sheet tab consisting of Monitor, Configure, Security, and Alam

    E

    the Cisco WCS uses the SNMP protocol to communicate with the controllers


    正确答案: D,B
    解析: 暂无解析