By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?() A. Create an additional ACL to block the access to VLAN 1.B. Move the management VLAN to something other than default.C. Move all ports to another VLAN and deactivate the default VLAN.D. Limit the access in the switch using port security configuration.E. Use static VLAN in trunks and access ports to restrict connections.F. Shutdown all unused ports in the Catalyst switch.
By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()
A. Create an additional ACL to block the access to VLAN 1.
B. Move the management VLAN to something other than default.
C. Move all ports to another VLAN and deactivate the default VLAN.
D. Limit the access in the switch using port security configuration.
E. Use static VLAN in trunks and access ports to restrict connections.
F. Shutdown all unused ports in the Catalyst switch.
相关考题:
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? (Choose two)A. The switch must be reachable through a port connected to its management VLAN.B. The switch console port must be connected to the Ethernet LAN.C. The switch must be fully configured as an SNMP agent.D. The switch must be configured with an IP address, subnet mask, and default gateway.E. The switch management VLAN must be created and have a membership of at least one switch port.F. The switch must be connected to a router over a VLAN trunk.
Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports
Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.
Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()A、Cisco Network AssistantB、Cisco Security Device ManagerC、Cisco Device ManagerD、Cisco Adaptive Security Device Manager
For which of the following campus LAN Areas is the Cisco Catalyst 500 Series switch most suitable?()A、Access AreaB、Backbone AreaC、Core AreaD、Distribution Area
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
Which three of these pre-requisite for resetting a Catalyst Express 500 switch when Cisco Network Assistant is unavailable?()A、At Least one enabled switch port that is unconnected to any deviceB、A PC pre-configured with a specific IP Address and MaskC、A PC or laptop with Windows 2000 or Windows XP installed and a web browser that has Java Script enabledD、Physical Access to SwitchE、A Switch with no connected devices
Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? ()A、 Cisco Catalyst 2800B、 Cisco Catalyst 3550C、 Cisco Catalyst 3750D、 Cisco Catalyst 4500E、 Cisco Catalyst 6500
Which two Aironet enterprise solution statements are true?()A、A Cisco Aironet AP handles the transmission of beacon frames and also handles responses to probe-request frames from clientsB、A Cisco Aironet solution includes intelligent Cisco Aironet access points (APs) and Cisco Catalyst switchesC、In the Cisco Aironet solution, each AP is locally configured by the use of either a web interface or the command line interfaceD、The Cisco Aironet AP handles real-time portions of the LWAPP protocol, and the WLAN controller handles those items which are not time sensitiveE、Virtual MAC architecture allows the splitting of the 802.11 protocol between the Cisco Aironet AP and a LAN switch
When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()A、Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.B、Enter the no switchport command to disable Layer 2 functionality at the interface level.C、Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.D、Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.
The network security policy requires that only one host be permitted to attach dynamically to each switch interfacE.If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? ()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10
If an enterprise customer required A switch for their branch office access layer, which family of switches would the customer likely choose from?()A、Cisco SFS 3000/7000B、Cisco Catalyst 2000 and 3000C、Cisco Catalyst 4000 and 6000D、Cisco Nexus
Company.com wants to put two Micro-Partitions on a p5-570 and attach to a SAN. What is the best LPAR configuration to maximize SAN availability using four Host Bus Adapters (HBAs)?()A、Two HBAs assigned to each redundant VIOS which provides VSCSI access to LUNsB、Two HBAs assigned to each LPAR with each LPAR owning HBAs on the same PCI bussesC、Two HBAs assigned to each LPAR with each LPAR owning HBAs on separate PCI bussesD、One HBA assigned to each LPAR and two HBAs assigned to a VIOS providing VSCSI access to LUNs
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10
The cisco ironport portfolio performs which service?()A、reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via emailB、defends thepenmeter from malicious users and unauthorized trafficC、providesA secure communication path through the internetD、determines if a user or device is authorized to access a switch port
Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration () port-profile type Ethernet name VM-Data vmware port-group switchport mode trunk switchport allowed vlan 400-410 channel-group auto mode active no shut state enabled A、 Cisco UCS fabric interconnectsB、 Pair of N5K’s in VPCC、 Standalone N5KD、 Pair of N5K’s in non-VPCE、 Cisco Catalyst 6000 Switch in VSS
For which of the following campus LAN area is the Cisco Catalyst Express 500 Series Switch most suitable?()A、Backbone AreaB、Access AreaC、Core AreaD、Distribution Area
When configuring port security on a Cisco Catalyst switch port, what is the default action taken by the switch if a violation occurs? ()A、protect (drop packets with unknown source addresses)B、restrict (increment SecurityViolation counter)C、shut down (access or trunk port)D、transition (the access port to a trunking port)
If an enterprise customer required a switch for their branch office access layer, which family of switches would the customer likely choose from?()A、Cisco Catalyst 2000 and 3000B、Cisco NexusC、Cisco Catalyst 4000 and 6000D、Cisco SFS 3000/7000
You need to configure port security on switch R1. Which two statements are true about this technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default. E、 Port security cannot be configured for ports supporting VoIP.
Which kind of management can be performed from the console port of a Cisco 6500 switch?()A、Physical management of the switchB、Logical management of the switchC、In-band management of the switchD、Out-of-band management of the switch
By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access? ()A、Create an additional ACL to block the access to VLAN 1.B、Move the management VLAN to something other than default.C、Move all ports to another VLAN and deactivate the default VLAN.D、Limit the access in the switch using port security configuration.E、Use static VLAN in trunks and access ports to restrict connections.F、Shutdown all unused ports in the Catalyst switch.
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.
多选题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()ACreate an additional ACL to block the access to VLAN 1.BMove the management VLAN to something other than default.CMove all ports to another VLAN and deactivate the default VLAN.DLimit the access in the switch using port security configuration.EUse static VLAN in trunks and access ports to restrict connections.FShutdown all unused ports in the Catalyst switch.
多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
单选题Which kind of management can be performed from the console port of a Cisco 6500 switch?()APhysical management of the switchBLogical management of the switchCIn-band management of the switchDOut-of-band management of the switch
单选题Why would a network administrator configure port security on a switch()。Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports
单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.