A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10
您可能感興趣的試卷
你可能感興趣的試題
A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.
A.FTP
B.Telnet
C.SMTP
D.DNS
E.HTTP
F.POP3
A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password
A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF
A.Configure port Fa0/1 to accept connections only from the static IP address of the server.
B.Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C.Configure the MAC address of the server as a static entry associated with port Fa0/1.
D.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F.Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
最新試題
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()
What is the purpose of the cisco Vlan Trunking protocol?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
Three access ports have been installed and configured to a small office.What term defines the wireless topology?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()