A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
您可能感興趣的試卷
你可能感興趣的試題
A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from a router to a leased line.
B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a router to a leased line.
C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a router to a phone line.
D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.
A. show reload
B. show boot
C. show running-config
D. show version
A. LAN
B. routing
C. WAN
D. network
A. presentation
B. session
C. transport
D. network
E. physical
A. transport
B. network
C. presentation
D. session
E. application
最新試題
An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()
On which options are standard access list based?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
At which layer of the OSI model dose PPP perform?()
Which command displays the CHAP authentication process as it occurs between two routers?()
Which IPsec security protocol should be used when confidentiality is required?()
The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()
At which layer of the OSI model is RSTP used to prevent loops?()
What is the subnetwork address for a host with the IP address 201.100.5.68/28?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()