單項選擇題

Refer to the exhibit. 
What type of attack is being defended against? ()

A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. 
What will happen to traffic within VLAN 14 with a source address of  172.16.10.5?()

A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.

2.單項選擇題

Refer to the exhibit. 
What will happen when one more user is connected to interface FastEthernet  5/1?()

A. The first address learned on the port will be removed from the secure address list and be  replaced with the new address.
B. All secure addresses will age out and be removed from the secure address list. This will cause  the security violation counter to increment.
C. The packets with the new source addresses will be dropped until a sufficient number of secure  MAC addresses are removed from the secure address list.
D. The interface will be placed into the error-disabled state immediately, and an SNMP trap  notification will be sent.

3.多項選擇題

Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1.  Given the output that was generated,
 which two security statement are true? ()

A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.  
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.  
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict  command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down. 
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut  down and an SNMP trap notification will be sent.

4.單項選擇題

Switch R1 has been configured with Private VLANs.
 With that type of PVLAN port should the default gateway be configured?()

A. Trunk
B. Isolated
C. Primary
D. Community
E. Promiscuous
F. None of the other alternatives apply

5.多項選擇題

What is true about access control on bridged and routed VLAN traffic? ()

A. Router ACLs can be applied to the input and output directions of a VLAN interface.
B. Bridged ACLs can be applied to the input and output directions of a VLAN interface.
C. Only router ACLs can be applied to a VLAN interface.
D. VLAN maps and router ACLs can be used in combination.
E. VLAN maps can be applied to a VLAN interface

最新試題

Refer to the exhibit. LACP has been configured on Switch1 as shown. Which is the correct command set to configure LACP on Switch2?()

題型:單項選擇題

How are STP timers and state transitions affected when a topology change occurs in an STP environment?()

題型:單項選擇題

Which two statements are true about BPDU port-guard and BPDU filtering?()

題型:多項選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:單項選擇題

What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()

題型:單項選擇題

Which statement is correct about RSTP port roles?()

題型:單項選擇題

Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()

題型:單項選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:單項選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項選擇題