单选题What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()ARSTP information is automatically aged out.BThe port sends a TCN to the root bridge.CThe port moves to listening state.DThe port becomes a normal spanning tree port.

单选题
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
A

RSTP information is automatically aged out.

B

The port sends a TCN to the root bridge.

C

The port moves to listening state.

D

The port becomes a normal spanning tree port.


参考解析

解析: 暂无解析

相关考题:

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。 A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.

After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

A new Catalyst switch is connected to an existing switch using a crossover cable. As a result of this, what would the switch port link lights display?()A、The switch port link lights will be off on both switches indicating the ports are not connected.B、The switch port link light will be off on one switch indicating that STP has disabled the port.C、The switch port link lights will flash amber indicating an error.D、The switch port link lights will be green indicating normal operation.

Which two of the following statements describe a routed switch port on a multilayer switch?()A、Layer 2 switching and Layer 3 routing are mutually supported.B、The port will not be associated with any VLAN.C、The routed switch port supports VLAN subinterfaces.D、The routed switch port is used when a switch has only one port per VLAN or subnet.E、The routed switch port ensures that STP remains in the forwarding state.

You work as a network Technician. A new workstation has consistently been unable to obtain anIP address from the DHCP server when the workstation boots. Older workstations function normally, and the new workstation obtains an address when manually forced to renew its address.  What should be configured on the switch to allow the workstation to obtain an IP address at boot?()A、UplinkFast on the switch port connected to the serverB、BackboneFast on the switch port connected to the serverC、PortFast on the switch port connected to the workstationD、trunking on the switch

When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()A、Duplex mode selectionsB、Auto MDIX selectionsC、Status SelectionsD、Group mode selectionsE、Port security selections

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

If a switch is working in the fail-open mode, what will happen when the switch’s CAM table fills to capacityand a new frame arrives?()A、A copy of the frame is forwarded out all switch ports other than the port the frame was received on.B、The frame is transmitted on the native VLAN.C、The switch sends a NACK segment to the frame’s source MAC address.D、The frame is dropped.

What two things will occur when an edge port receives a BPDU?()A、The port immediately transitions to the Forwarding state.B、The switch generates a Topology Change Notification (TCN) BPDU.C、The port immediately transitions to the err-disable state.D、The port becomes a normal STP switch port.

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()A、RSTP information is automatically aged out.B、The port sends a TCN to the root bridge.C、The port moves to listening state.D、The port becomes a normal spanning tree port.

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)

A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A、 The host will be allowed to connect.B、 The port will shut down.C、 The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D、 The host will be refused access.E、 None of the other alternatives apply

多选题When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()ADuplex mode selectionsBAuto MDIX selectionsCStatus SelectionsDGroup mode selectionsEPort security selections

单选题A new Catalyst switch is connected to an existing switch using a crossover cable. As a result of this, what would the switch port link lights display?()AThe switch port link lights will be off on both switches indicating the ports are not connected.BThe switch port link light will be off on one switch indicating that STP has disabled the port.CThe switch port link lights will flash amber indicating an error.DThe switch port link lights will be green indicating normal operation.

单选题A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A The host will be allowed to connect.B The port will shut down.C The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D The host will be refused access.E None of the other alternatives apply

单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。AThe switch will not forward unicast frames.BThe switch will forward the frame to a specific port.CThe switch will return a copy of the frame out the source port.DThe switch will remove the destination MAC from the switch table.EThe switch will forward the frame to all ports except the port on which it was received.

多选题What two things will occur when an edge port receives a BPDU?()AThe port immediately transitions to the Forwarding state.BThe switch generates a Topology Change Notification (TCN) BPDU.CThe port immediately transitions to the err-disable state.DThe port becomes a normal STP switch port.

单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()AThe port’s violation mode is set to restrictBThe port is shut downCThe MAC address table is cleared and the new MAC address is entered into the tableDThe port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.

多选题Which two of the following statements describe a routed switch port on a multilayer switch?()ALayer 2 switching and Layer 3 routing are mutually supported.BThe port will not be associated with any VLAN.CThe routed switch port supports VLAN subinterfaces.DThe routed switch port is used when a switch has only one port per VLAN or subnet.EThe routed switch port ensures that STP remains in the forwarding state.