niusouti.com

Which set of commands is recommended to prevent the use of a hub in the access layer?()A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport por

题目
Which set of commands is recommended to prevent the use of a hub in the access layer?()

A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1


相似考题
更多“Which set of commands is recommended to prevent the use of a hub in the access layer?() ”相关问题
  • 第1题:

    A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()

    A.

    B.

    C.

    D.


    参考答案:C

  • 第2题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第3题:

    Which deployed VoWLAN client security option is recommended by Cisco?()

    • A、Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication
    • B、Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through
    • C、Layer 3 with Layer 3 Security set to VPN Pass-Through
    • D、Layer 2 with Layer 2 Security set to 802.1X

    正确答案:D

  • 第4题:

    Which of these recommended designs provides the highest availability?()

    • A、map the Layer 2 VLAN number to the Layer 3 subnet
    • B、control route propagation to edge switches using distribute lists
    • C、use a Layer 2 distribution interconnection link with HSRP or GLBP
    • D、use a Layer 3 distribution interconnection link with HSRP or GLBP
    • E、use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

    正确答案:A

  • 第5题:

    You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()

    • A、Disable the values for the Menu Module Roles property. 
    • B、Set the Use Security value in the form module Property Palette to 'True'. 
    • C、Set the Use Security value in the form module Property Palette to 'False'. 
    • D、Set the Use Security value in the menu module Property Palette to 'True'. 
    • E、Set the Use Security value in the menu module Property Palette to 'False'. 

    正确答案:E

  • 第6题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第7题:

    Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()

    • A、Troubleshooting is more complicated.
    • B、Service and switch modules are underutilized.
    • C、Layer 2 adjacency is required with the servers that use this design.
    • D、Layer 3 adjacency is required with the servers that use this design.
    • E、Load balancing will always occur across both access layer uplinks.

    正确答案:B,C

  • 第8题:

    Which firewall best practices can help mitigate worm and other automated attacks?()

    • A、Segment security zones
    • B、Restrict access to firewalls
    • C、Use logs and alerts
    • D、Set connection limits

    正确答案:D

  • 第9题:

    单选题
    You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()
    A

     Use the CHANGE_PASSWORD command of the Listener control utility.

    B

     Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.

    C

     Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.

    D

     Manually modify the listener.ora file to include the password for the listener and restart the listener.


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()
    A

    In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.

    B

    In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.

    C

    In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).

    D

    In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.

    E

    In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.

    F

    In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)


    正确答案: F,E
    解析: 暂无解析

  • 第11题:

    单选题
    Which of these recommended designs provides the highest availability?()
    A

     map the Layer 2 VLAN number to the Layer 3 subnet

    B

     control route propagation to edge switches using distribute lists

    C

     use a Layer 2 distribution interconnection link with HSRP or GLBP

    D

     use a Layer 3 distribution interconnection link with HSRP or GLBP

    E

     use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP


    正确答案: E
    解析: 暂无解析

  • 第12题:

    单选题
    Which deployed VoWLAN client security option is recommended by Cisco?()
    A

    Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication

    B

    Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through

    C

    Layer 3 with Layer 3 Security set to VPN Pass-Through

    D

    Layer 2 with Layer 2 Security set to 802.1X


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第14题:

    You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()

    • A、permit access-list 101 out
    • B、ip access-group 101 out
    • C、apply access-list 101 out
    • D、access-class 101 out
    • E、ip access-list e0 out

    正确答案:B

  • 第15题:

    Which two of these are recommended practices with trunks? ()

    • A、 use ISL encapsulation
    • B、 use 802.1q encapsulation
    • C、 set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
    • D、 use VTP server mode to support dynamic propagation of VLAN information across the network 
    • E、 set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

    正确答案:B,E

  • 第16题:

    Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

    • A、 Use default Layer 4 hash in core.
    • B、 Use default Layer 3 hash in distribution.
    • C、 Use default Layer 4 hash in distribution.
    • D、 Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

    正确答案:D

  • 第17题:

    You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()

    • A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.
    • B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.
    • C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).
    • D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.
    • E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.
    • F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

    正确答案:A,B,C

  • 第18题:

    Nexus# conf t  Enter configuration commands, one per line. End with CNTL/Z.  Nexus(config)# interface Loopback10  % Permission denied  Nexus(config)# ?  no Negate a command or set its defaults  username Configure user information.  end Go to exec mode  exit Exit from command interpreter  What is the reason why this user is not able to enter configuration commands?()

    • A、 The user did not enter enable prior to going into configuration mode.
    • B、 The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.
    • C、 The user RBAC role is set to network-operator.
    • D、 The user failed authentication and user access defaulted to read-only mode.
    • E、 The AAA server is currently not responding.

    正确答案:C

  • 第19题:

    Which two of these are recommended practices with trunks?()

    • A、use ISL encapsulation
    • B、use 802.1q encapsulation
    • C、set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
    • D、use VTP server mode to support dynamic propagation of VLAN information across the network
    • E、set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation

    正确答案:B,E

  • 第20题:

    You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()

    • A、 Use the CHANGE_PASSWORD command of the Listener control utility.
    • B、 Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.
    • C、 Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.
    • D、 Manually modify the listener.ora file to include the password for the listener and restart the listener.

    正确答案:C

  • 第21题:

    单选题
    Nexus# conf t  Enter configuration commands, one per line. End with CNTL/Z.  Nexus(config)# interface Loopback10  % Permission denied  Nexus(config)# ?  no Negate a command or set its defaults  username Configure user information.  end Go to exec mode  exit Exit from command interpreter  What is the reason why this user is not able to enter configuration commands?()
    A

     The user did not enter enable prior to going into configuration mode.

    B

     The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.

    C

     The user RBAC role is set to network-operator.

    D

     The user failed authentication and user access defaulted to read-only mode.

    E

     The AAA server is currently not responding.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
    A

     Use default Layer 4 hash in core.

    B

     Use default Layer 3 hash in distribution.

    C

     Use default Layer 4 hash in distribution.

    D

     Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which set of commands is recommended to prevent the use of a hub in the access layer?()
    A

    switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

    B

    switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

    C

    switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

    D

    switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1


    正确答案: C
    解析: 暂无解析