單項(xiàng)選擇題

Refer to the exhibit. 
What type of attack is being defended against? ()

A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

2.單項(xiàng)選擇題

Refer to the exhibit. 
What will happen when one more user is connected to interface FastEthernet  5/1?()

A. The first address learned on the port will be removed from the secure address list and be  replaced with the new address.
B. All secure addresses will age out and be removed from the secure address list. This will cause  the security violation counter to increment.
C. The packets with the new source addresses will be dropped until a sufficient number of secure  MAC addresses are removed from the secure address list.
D. The interface will be placed into the error-disabled state immediately, and an SNMP trap  notification will be sent.

3.多項(xiàng)選擇題

Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1.  Given the output that was generated,
 which two security statement are true? ()

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.  
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.  
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict  command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down. 
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut  down and an SNMP trap notification will be sent.

4.單項(xiàng)選擇題

Switch R1 has been configured with Private VLANs.
 With that type of PVLAN port should the default gateway be configured?()

A. Trunk
B. Isolated
C. Primary
D. Community
E. Promiscuous
F. None of the other alternatives apply

5.多項(xiàng)選擇題

What is true about access control on bridged and routed VLAN traffic? ()

A. Router ACLs can be applied to the input and output directions of a VLAN interface.
B. Bridged ACLs can be applied to the input and output directions of a VLAN interface.
C. Only router ACLs can be applied to a VLAN interface.
D. VLAN maps and router ACLs can be used in combination.
E. VLAN maps can be applied to a VLAN interface

最新試題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:單項(xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題

Which two statements about the various implementations of STP are true?()

題型:多項(xiàng)選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項(xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項(xiàng)選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項(xiàng)選擇題

Which statement is correct about RSTP port roles?()

題型:單項(xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項(xiàng)選擇題