單項選擇題A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is the difference between a CSU/DSU and a modem?()

A. A CSU/DSU converts analog signals from a router to a leased line; a modem converts analog signals from a router to a leased line.
B. A CSU/DSU converts analog signals from a router to a phone line; a modem converts digital signals from a router to a leased line.
C. A CSU/DSU converts digital signals from a router to a phone line; a modem converts analog signals from a router to a phone line.
D. A CSU/DSU converts digital signals from a router to a leased line; a modem converts digital signals from a router to a phone line.

2.單項選擇題Which command reveals the last method used to powercycle a router?()

A. show reload
B. show boot
C. show running-config
D. show version

最新試題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項選擇題

What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()

題型:單項選擇題

At which layer of the OSI model is RSTP used to prevent loops?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which command encrypts all plaintext passwords?()

題型:單項選擇題

Which command displays the CHAP authentication process as it occurs between two routers?()

題型:單項選擇題

Which Cisco IOS diagnostics command can disrupt the operation of a router under high-load conditions?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

題型:單項選擇題