单选题Which set of commands is recommended to prevent the use of a hub in the access layer?()Aswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1Bswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1Cswitch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1Dswitch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

单选题
Which set of commands is recommended to prevent the use of a hub in the access layer?()
A

switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

B

switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

C

switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

D

switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1


参考解析

解析: 暂无解析

相关考题:

You would like to configure an Ethernet interface with the following characteristics:Which set of configuration commands accurately completes this task?() A.AB.BC.CD.D

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?() A. Bandwidth 56000B. Bandwidth 56000000C. Bandwidth 56D. Bandwidth 56kbps

Which two of these are recommended practices with trunks? () A. use ISL encapsulationB. use 802.1q encapsulationC. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD. use VTP server mode to support dynamic propagation of VLAN information across the networkE. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

Which set of commands is recommended to prevent the use of a hub in the access layer?() A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

Which two of these are recommended practices with trunks? ()A、 use ISL encapsulationB、 use 802.1q encapsulationC、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、 use VTP server mode to support dynamic propagation of VLAN information across the network E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet anyB、Use the set protocol MBGP command to enable MBGPC、Under the BGP group, configure family inet multicastD、Use the set rib-group command to copy the multicast routes into inet.1

Which mechanism does External BGP use to prevent the formation of routing loops?()A、AS pathB、Split horizonC、Poison reverseD、Unicast RPF check

Which of these commands can you use to show if an operational Catalyst switch port is set for autonegotiation of speed and duplex when running Cisco IOS software?()A、show port networkB、 show running-configC、show controllers Ethernet-controllerD、 show interfaces

You are working as an administrator at TestKing, and you need to set the bandwidth of your routers serial port to 56K. Which of the following commands would you use?()A、Bandwidth 56000B、Bandwidth 56000000C、Bandwidth 56D、Bandwidth 56kbps

Which two of these are recommended practices with trunks?()A、use ISL encapsulationB、use 802.1q encapsulationC、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiationD、use VTP server mode to support dynamic propagation of VLAN information across the networkE、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

Which of the following commands would a technician MOST likely use to map a printer from aremote computer?()A、NET USEB、IPCONFIGC、NSLOOKUPD、TRACERT

Which of the following ping commands would a technician use to ping continuously?()A、PING -lB、PING -RC、PING -tD、PING -a

Which of the following commands should Karen, a technician, use to examine and restoreprotected system files?()A、SFCB、RECOVERC、REPLACED、COPY

Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET

Which of the following commands should be used to set network attributes on a currently running kernel?()A、 noB、 chdevC、 vmtuneD、 schedtune

What are two commands that can be used to configure MBGP for multicast?()A、Under the BGP group, configure family inet any.B、Use the set protocol MBGP command to enable MBGP.C、Under the BGP group, configure family inet multicast.D、Use the set rib-group command to copy the multicast routes into inet.1.

You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A、 Use the CHANGE_PASSWORD command of the Listener control utility.B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.

You share your portable computer with a co-worker. You use separate user accounts to log on. A wireless network is available to you and your co-worker.  You need to prevent your co-worker from modifying your wireless network profile.  What should you do?()A、Disable the Connect even if the network is not broadcasting option.B、In the Network and Sharing Center window, click the Diagnose and repair option.C、Set the default wireless profile type to the Use all-users only profile (recommended) option. Recreate the wireless network.D、Set the default wireless profile type to the Use all-users and per-user profiles option. Recreate the wireless network by using the Save this network for me only option.

单选题Which extinguishing agent is recommended in the Chemical Data Guide for use on a carbon disulfide fire?()AAlcohol foamBDry chemicalCChemical foamDWater fog

单选题You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()A Use the CHANGE_PASSWORD command of the Listener control utility.B Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.C Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.D Manually modify the listener.ora file to include the password for the listener and restart the listener.

单选题Which set of commands allows PPPoE dynamic interfaces to use a profile called config-info?()Aprofile config-info auto-configure pppBprofile config-info auto-configure anyCprofile ppp config-info auto-configure pppoeDprofile pppoe config-info auto-configure pppoe

单选题Which of the following commands should be used to set network attributes on a currently running kernel?()A noB chdevC vmtuneD schedtune

单选题Which of these commands can you use to show if an operational Catalyst switch port is set for autonegotiation of speed and duplex when running Cisco IOS software?()Ashow port networkB show running-configCshow controllers Ethernet-controllerD show interfaces

单选题Which extinguishing agent is NOT recommended in the Chemical Data Guide for use on a cyclohexane fire?()AFoamBCarbon dioxideCDry chemicalDWater fog

多选题Which two commands would you use to discard a candidate configuration?()ArollbackBdeleteCdelete 0Drollback 0

单选题You want to perform in incomplete recovery of your database.  You plan to use these commands to recover your database:  SET UNTIL TIME = ’2000-12-09:11:44:00’;  RESTORE DATABASE; RECOVER DATABASE;  How should the commands be executed? ()AOnly the SET command must be within a RUN block.BAll commands should be executed at the RMAN prompt.CAll three commands must be within a single RUN block.DOnly the RESTORE and RECOVER commands must be within a single RUN block.

单选题Which of the following commands would a technician use to view the active applicationconnections on a local PC to the network?()AipconfigBnetstatCnslookupDnet use