單項選擇題Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()

A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.

2.單項選擇題What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()

A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable

3.多項選擇題What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()

A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router

4.單項選擇題Which type of cable should be used to make a connection between the Fa0/0 port on a router and the Fa0/0 port switch?()

A. Rollover cable
B. Console cab le
C. Crossover cable
D. Straight-through cable
E. Serial cable

5.多項選擇題You are experiencing intermittent issues relating to congestion with your network.What are the possible causes of congestion on a LAN?()

A. A broadcast domain with too many hosts.
B. Full duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Network Segmentation.
F. Low bandwidth.

最新試題

New switches have been purchased for a network upgrade. The objective for the network design emphasizes efficient, error-free transport instead of fast transport.Which switching mode should be configured on the new switches to provide error-free transport to the network? ()

題型:單項選擇題

Which statement describes the rule of split horizon?()

題型:單項選擇題

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

題型:多項選擇題

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

題型:多項選擇題

Which of the following host addresses are member of networks that can be routed across the public Internet? ()

題型:多項選擇題

A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()

題型:多項選擇題

What does a configuration Register Setting of 0x2105 indicate to the Router? ()

題型:單項選擇題

Which of the following correctly describe steps in the OSI data encapsulation process?()

題型:多項選擇題

A technician at TestKing needs to update the network documentation. One of the tasks includes documenting the name of the IOS image file of each router in the network.Which commands could be used to find this information?()

題型:單項選擇題

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()

題型:多項選擇題