單項選擇題What is valid reason for a switch to deny port access to new devices when port security is enabled?()

A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the purpose using the traceroute command?()

A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.

2.單項選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

3.單項選擇題What is the default routing update period for RIPv2?()

A. 15 seconds
B. 30 seconds
C. 180 seconds
D. 240 seconds

4.單項選擇題An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm?()

A. The PC has connectivity with a local host.
B. The PC has connectivity with a Layer 3 device.
C. The PC has a default gateway correctly configured
D. The PC has connectivity up to Layer 5 of the OSI model
E. The PC has the TCP/IP protocol stack correctly installed.

5.單項選擇題How does using the service password encryption command on a router provide additional security? ()

A. by encrypting all passwords passing through the router
B. by encrypting passwords in the plain text configuration file
C. by requiring entry of encrypted passwords for access to the device
D. by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
E. by automatically suggesting encrypted passwords for use in configuring the router

最新試題

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

題型:單項選擇題

Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()

題型:單項選擇題

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

A network administrator is trying to add a new router into an established OSPF network.The networks attached to the new router do not appear in the routing tables of the other OSPF routers.Given the information in the partial configuration shown below,what configuration error is causing this problem?()Router(config)#router ospf 1Router(config-router)#network 10.0.0.0 255.0.0.0 area 0

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

What is the default administrative distance of OSPF?()

題型:單項選擇題

What is the purpose of the cisco Vlan Trunking protocol?()

題型:單項選擇題