niusouti.com

Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()A. SW1#show swithport port-security interface FastEthernet 0/12B. SW1# show swithport port-secure interface FastEthernet 0/12C. SW1# show

题目
Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

A. SW1#show swithport port-security interface FastEthernet 0/12

B. SW1# show swithport port-secure interface FastEthernet 0/12

C. SW1# show port-secure interface FastEthernet 0/12

D. SW1#show running-config

E. SW1#show port-security interface FastEthernet 0/12


相似考题
参考答案和解析
参考答案:D, E
更多“Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?() ”相关问题
  • 第1题:

    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 
    • D、Verify that the VLAN virtual interface has been correctly created and enabled.

    正确答案:B

  • 第2题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?()

    • A、SW1#shows withport port-security interface FastEthernet0/12
    • B、SW1#shows withport port-secure interface FastEthernet0/12
    • C、SW1#show port-secure interface FastEthernet0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第3题:

    You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the VLAN was added on all switches with the use of the show vlan command. 
    • C、Verify that the switch is configured to allow for trunking on the switch ports.
    • D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

    正确答案:B

  • 第4题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config
    • E、SW1#show port-security interface FastEthernet 0/12

    正确答案:D,E

  • 第5题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第6题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第7题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第8题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1#show swithport port-secure interface FastEthernet 0/12

    C

    SW1#show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    多选题
    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config

    E

    SW1#show port-security interface FastEthernet 0/12


    正确答案: E,D
    解析: 暂无解析

  • 第11题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第12题:

    单选题
    What is valid reason for a switch to deny port access to new devices when port security is enabled?()
    A

    The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.

    B

    The denied MAC address are statically configured on the port.

    C

    The minimum MAC threshold has been reached.

    D

    The absolute aging times for the denied MAC addresses have expired.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Which set of commands is recommended to prevent the use of a hub in the access layer?()

    • A、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
    • B、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
    • C、switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
    • D、switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

    正确答案:C

  • 第14题:

    哪个两个命令正确验证是否端口快速以太网0/12端口安全性已配置的交换机?()

    • A、 SW1#show swithport port-security interface FastEthernet 0/12
    • B、 SW1# show swithport port-secure interface FastEthernet 0/12
    • C、 SW1# show port-secure interface FastEthernet 0/12
    • D、 SW1#show running-config
    • E、 SW1#show port-security interface FastEthernet 0/12

    正确答案:D,E

  • 第15题:

    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第16题:

    You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()

    • A、Verify that trunked links are configured to allow the VLAN traffic.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
    • D、Verify that different native VLANs exist between two switches for security purposes.

    正确答案:A

  • 第17题:

    What is valid reason for a switch to deny port access to new devices when port security is enabled?()

    • A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
    • B、The denied MAC address are statically configured on the port.
    • C、The minimum MAC threshold has been reached.
    • D、The absolute aging times for the denied MAC addresses have expired.

    正确答案:B

  • 第18题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第19题:

    A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()

    • A、The wrong cable type has been used.
    • B、. IDS has shut down the computer's switch port.
    • C、The port on the switch is configured incorrectly
    • D、Spanning tree protocol was implemented.

    正确答案:C

  • 第20题:

    多选题
    哪个两个命令正确验证是否端口快速以太网0/12端口安全性已配置的交换机?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config

    E

    SW1#show port-security interface FastEthernet 0/12


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第22题:

    单选题
    A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()
    A

    The wrong cable type has been used.

    B

    . IDS has shut down the computer's switch port.

    C

    The port on the switch is configured incorrectly

    D

    Spanning tree protocol was implemented.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()
    A

    Verify that different native VLANs exist between two switches for security purposes.

    B

    Verify that the switch is configured to allow for trunking on the switch ports.

    C

    Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 

    D

    Verify that the VLAN virtual interface has been correctly created and enabled.


    正确答案: B
    解析: 暂无解析