单选题Which configuration is used to enable root guard?()Ainterface gig3/1 spanning-tree guard rootBinterface gig3/1 spanning-tree root guardCinterface gig3/1 spanning-tree root-guardDinterface gig3/1 spanning-tree root-guard default

单选题
Which configuration is used to enable root guard?()
A

interface gig3/1  spanning-tree guard root

B

interface gig3/1  spanning-tree root guard

C

interface gig3/1  spanning-tree root-guard

D

interface gig3/1  spanning-tree root-guard default


参考解析

解析: 暂无解析

相关考题:

Which CLI mode allows you to make configuration changes?() A. enable modeB. configuration modeC. operational modeD. active mode

The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

Which of the following settings will reduce packet overhead and overall latency in a standalonepoint-to-point bridge deployment?()A、enable concatenation on the non-root bridge onlyB、enable concatenation on the root bridge onlyC、enable concatenation on both the root bridge and non-root bridgeD、enable concatenation on the root bridge and set it as desirable on the non-root bridgeE、set concatenation as desirable on the root bridge and enable it on the non-root bridge

Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()A、Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.B、UDLD protects against STP failures caused by cabling problems that create one-way links.C、Loop guard detects and protects against duplicate packets being received and transmitted on different ports.D、UDLD protects against unidirectional cabling problems on copper and fiber media.E、Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply

If a port configured with STP loop guard stops receiving BPDUs, the port will be put into which state?()A、learning stateB、listening stateC、forwarding stateD、root-inconsistent state

Which two statements correctly describe characteristics of the PortFast feature? ()A、STP will be disabled on the port.B、PortFast can also be configured on trunk ports.C、PortFast is required to enable port-based BPDU guard.D、PortFast is used for both STP and RSTP host ports.E、PortFast is used for STP-only host ports.

Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A、 su B、 su root C、 su - root D、 su -c "root"

Which CLI mode allows you to make configuration changes?()A、enable modeB、configuration modeC、operational modeD、active mode

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()A、The port must be put into forwarding state manually after root-inconsistent state has beencorrectedB、A Root Guard port receiving superior BPDU goes into a root-inconsistent stateC、A Root Guard port receiving inferior BPDU goes into a root-inconsistent stateD、While the port is in a root-inconsistent state no user data is sent across that portE、The port returns to a forwarding state if inferior BPDUs stopF、It should be applied to all switch ports

After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.

Which administration tool is used to enable or disable the logging and tracing of WebSphere Commerce components?()A、Configuration ManagerB、WebSphere Application Server Administrative ConsoleC、WebSphere Commerce Administration consoleD、Store ServicesE、WebSphere Commerce Accelerator

Which of the following methods can be used to enable/disable the Commerce Payments CustomOffline cassette?()A、From WebSphere Commerce Configuration ManagerB、By updating the ENABLED column in the CASSETTES tableC、By running the ’configureCassette’ commandD、From WebSphere Commerce Administration ConsoleE、From WebSphere Commerce Payments User Interface

Company.com has encountered a problem on the HMC, which requires access to the root shell on the HMC. Which of the following is necessary to access the root userid on the HMC?()A、Enable remote commands on the HMC Configuration menu,then use ssh to login to theHMC,enter su - rootB、Login to the HMC as hscpe and run pesh,using a temporary password from IBM Support,afterward, enter su - rootC、Login to the HMC as hscroot,then run pesh,using a temporary password from IBM Support, afterward,enter su - rootD、Enable remote commands on the HMC Configuration menu,then telnet in as hscroot,entersu - root

Which configuration command is used to make the ERX Edge Router an NTP server?()A、 set ntp-serverB、 set ntp serverC、 ntp-server enableD、 ntp server enable

单选题Which statement is true about loop guard?()ALoop guard only operates on interfaces that are considered point-to-point by the spanning tree.BLoop guard only operates on root ports.CLoop guard only operates on designated ports.DLoop guard only operates on edge ports.

多选题Which three steps are parts of the root password recovery process?()AReboot the deviceBRun the recovery scriptCReset the root passwordDReset the user passwordsELoad factory-default configuration

多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

单选题The enable secret command is used to secure access to which CLI mode?()Auser EXEC modeBglobal configuration modeCprivileged EXEC modeDauxiliary setup mode

单选题Which configuration is used to enable root guard?()Ainterface gig3/1 spanning-tree guard rootBinterface gig3/1 spanning-tree root guardCinterface gig3/1 spanning-tree root-guardDinterface gig3/1 spanning-tree root-guard default

单选题Which of the following commands can be used to gain root privileges and profile without initially logging in as root?()A su B su root C su - root D su -c root

多选题Which of the following characteristics describe the Root Guard feature?(Choose all that apply.)()AThe port must be put into forwarding state manually after root-inconsistent state has beencorrectedBA Root Guard port receiving superior BPDU goes into a root-inconsistent stateCA Root Guard port receiving inferior BPDU goes into a root-inconsistent stateDWhile the port is in a root-inconsistent state no user data is sent across that portEThe port returns to a forwarding state if inferior BPDUs stopFIt should be applied to all switch ports

多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.

多选题After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()AIf a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.BEnable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.CConfigure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.DSet the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.EDisable all unused ports and place them in an unused VLAN to avoid unauthorized access.

多选题Which of the following methods can be used to enable/disable the Commerce Payments CustomOffline cassette?()AFrom WebSphere Commerce Configuration ManagerBBy updating the ENABLED column in the CASSETTES tableCBy running the ’configureCassette’ commandDFrom WebSphere Commerce Administration ConsoleEFrom WebSphere Commerce Payments User Interface

单选题The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()ABPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. BBPDU guard can guarantee proper selection of the root bridge.CBPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.DBPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.ENone of the other alternatives apply