Which set of commands is recommended to prevent the use of a hub in the access layer?() A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

Which set of commands is recommended to prevent the use of a hub in the access layer?()

A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1


相关考题:

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

Which of these recommended designs provides the highest availability?() A. map the Layer 2 VLAN number to the Layer 3 subnetB. control route propagation to edge switches using distribute listsC. use a Layer 2 distribution interconnection link with HSRP or GLBPD. use a Layer 3 distribution interconnection link with HSRP or GLBPE. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

Which two of these are recommended practices with trunks? () A. use ISL encapsulationB. use 802.1q encapsulationC. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD. use VTP server mode to support dynamic propagation of VLAN information across the networkE. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()A.B.C.D.

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption

You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()A、permit access-list 101 outB、ip access-group 101 outC、apply access-list 101 outD、access-class 101 outE、ip access-list e0 out

Which deployed VoWLAN client security option is recommended by Cisco?()A、Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB、Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC、Layer 3 with Layer 3 Security set to VPN Pass-ThroughD、Layer 2 with Layer 2 Security set to 802.1X

Which two of these are recommended practices with trunks? ()A、 use ISL encapsulationB、 use 802.1q encapsulationC、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、 use VTP server mode to support dynamic propagation of VLAN information across the network E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

Which of these recommended designs provides the highest availability?()A、map the Layer 2 VLAN number to the Layer 3 subnetB、control route propagation to edge switches using distribute listsC、use a Layer 2 distribution interconnection link with HSRP or GLBPD、use a Layer 3 distribution interconnection link with HSRP or GLBPE、use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A、 Use default Layer 4 hash in core.B、 Use default Layer 3 hash in distribution.C、 Use default Layer 4 hash in distribution.D、 Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A、Disable the values for the Menu Module Roles property. B、Set the Use Security value in the form module Property Palette to 'True'. C、Set the Use Security value in the form module Property Palette to 'False'. D、Set the Use Security value in the menu module Property Palette to 'True'. E、Set the Use Security value in the menu module Property Palette to 'False'.

You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.

Nexus# conf t  Enter configuration commands, one per line. End with CNTL/Z.  Nexus(config)# interface Loopback10  % Permission denied  Nexus(config)# ?  no Negate a command or set its defaults  username Configure user information.  end Go to exec mode  exit Exit from command interpreter  What is the reason why this user is not able to enter configuration commands?()A、 The user did not enter enable prior to going into configuration mode.B、 The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.C、 The user RBAC role is set to network-operator.D、 The user failed authentication and user access defaulted to read-only mode.E、 The AAA server is currently not responding.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

Which two of these are recommended practices with trunks?()A、use ISL encapsulationB、use 802.1q encapsulationC、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、use VTP server mode to support dynamic propagation of VLAN information across the networkE、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits

You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.

单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A Use the CHANGE_PASSWORD command of the Listener control utility.B Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D Manually modify the listener.ora file to include the password for the listener and restart the listener.

单选题Nexus# conf t  Enter configuration commands, one per line. End with CNTL/Z.  Nexus(config)# interface Loopback10  % Permission denied  Nexus(config)# ?  no Negate a command or set its defaults  username Configure user information.  end Go to exec mode  exit Exit from command interpreter  What is the reason why this user is not able to enter configuration commands?()A The user did not enter enable prior to going into configuration mode.B The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.C The user RBAC role is set to network-operator.D The user failed authentication and user access defaulted to read-only mode.E The AAA server is currently not responding.

多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

单选题Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A Use default Layer 4 hash in core.B Use default Layer 3 hash in distribution.C Use default Layer 4 hash in distribution.D Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

单选题Which of these recommended designs provides the highest availability?()A map the Layer 2 VLAN number to the Layer 3 subnetB control route propagation to edge switches using distribute listsC use a Layer 2 distribution interconnection link with HSRP or GLBPD use a Layer 3 distribution interconnection link with HSRP or GLBPE use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

单选题Which set of commands is recommended to prevent the use of a hub in the access layer?()Aswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1Bswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1Cswitch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1Dswitch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

单选题Which deployed VoWLAN client security option is recommended by Cisco?()ALayer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationBLayer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughCLayer 3 with Layer 3 Security set to VPN Pass-ThroughDLayer 2 with Layer 2 Security set to 802.1X