What is valid reason for a switch to deny port access to new devices when port security is enabled?()A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.B、The denied MAC address are statically configured on the port.C、The minimum MAC threshold has been reached.D、The absolute aging times for the denied MAC addresses have expired.

What is valid reason for a switch to deny port access to new devices when port security is enabled?()

  • A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
  • B、The denied MAC address are statically configured on the port.
  • C、The minimum MAC threshold has been reached.
  • D、The absolute aging times for the denied MAC addresses have expired.

相关考题:

You have configured a Ezonexam switch as shown below:Ezonexam3(config-if) switchport port-securityEzonexam3(config-if) switchport port-security mac-address stickySelect the action below that results from executing these commands.A. A dynamically learned MAC address is saved in the VLAN database.B. A dynamically learned MAC address is saved in the startup-configuration file.C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.D. A dynamically learned MAC address is saved in the running-configuration file.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.F. None of the above

When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?A.when all switches have the same BID as the root switchB.when all switches have received the MAC address of each neighboring switchC.when every enabled switch port has been assigned a unique identifierD.when every operating switch port is in either the blocking or forwarding stateE.when all switches are in either client, server, or transparent mode

After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.

What is valid reason for a switch to deny port access to new devices when port security is enabled?() A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.B. The denied MAC address are statically configured on the port.C. The minimum MAC threshold has been reached.D. The absolute aging times for the denied MAC addresses have expired.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

Select the action that results from executing these commands.()Switch(config-if) switchport port-securitySwitch(config-if) switchport port-security mac-address sticky A.A dynamically learned MAC address is saved in the startup-configuration file.B.A dynamically learned MAC address is saved in the running-configuration file.C.A dynamically learned MAC address is saved in the VLAN database.D.Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E.Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?() A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()A、when all switches have the same BID as the root switchB、when all switches have received the MAC address of each neighboring switchC、when every enabled switch port has been assigned a unique identifierD、when every operating switch port is in either the blocking or forwarding stateE、when all switches are in either client, server, or transparent mode

Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()A、A dynamically learned MAC address is saved in the startup-configuration file.B、A dynamically learned MAC address is saved in the running-configuration file.C、A dynamically learned MAC address is saved in the VLAN database.D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()A、Static secure MAC addressB、Dynamic secure MAC addressC、Pervasive secure MAC addressD、Sticky secure MAC address

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A、 The host will be allowed to connect.B、 The port will shut down.C、 The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D、 The host will be refused access.E、 None of the other alternatives apply

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

单选题A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()AVisually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandBHave end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandCUse the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themDUse show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

单选题A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()AVisually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.BHave end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.CUse the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.DUse show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

单选题Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()AA dynamically learned MAC address is saved in the startup-configuration file.BA dynamically learned MAC address is saved in the running-configuration file.CA dynamically learned MAC address is saved in the VLAN database.DStatically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.EStatically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

单选题When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?()Awhen all switches have the same BID as the root switchBwhen all switches have received the MAC address of each neighboring switchCwhen every enabled switch port has been assigned a unique identifierDwhen every operating switch port is in either the blocking or forwarding stateEwhen all switches are in either client, server, or transparent mode

多选题A network administrator needs to configure port security on a switch.which two statements are true?()AThe network administrator can apply port security to dynamic access portsBThe network administrator can configure static secure or sticky secure mac addresses in the voice vlan.CThe sticky learning feature allows the addition of dynamically learned addresses to the running configuration.DThe network administrator can apply port security to EtherChannels.EWhen dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

单选题Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyAA dynamically learned MAC address is saved in the startup-configuration file.BA dynamically learned MAC address is saved in the running-configuration file.CA dynamically learned MAC address is saved in the VLAN database.DStatically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.EStatically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()AThe port’s violation mode is set to restrictBThe port is shut downCThe MAC address table is cleared and the new MAC address is entered into the tableDThe port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

单选题When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()ANo more than one secure MAC address should be set.BThe default will be set.CThe IP phone should use a dedicated port, therefore only one MAC address is needed per port.DNo value is needed if the switchport priority extend command is configured. ENo more than two secure MAC addresses should be set.

单选题What is valid reason for a switch to deny port access to new devices when port security is enabled?()AThe denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.BThe denied MAC address are statically configured on the port.CThe minimum MAC threshold has been reached.DThe absolute aging times for the denied MAC addresses have expired.

单选题A Company switch was configured as shown below:  switchport mode access  switchport port-security   switchport port-security maximum 2 switchport port-security mac-address 0002.0002.0002   switchport port-security violation shutdown   Given the configuration output shown above,  what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()A The host will be allowed to connect.B The port will shut down.C The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  D The host will be refused access.E None of the other alternatives apply