In which Spanning-Tree states does a switch port learn MAC addresses?()A、BlockingB、ListeningC、ForwardingD、LearningE、Relaying

题目

In which Spanning-Tree states does a switch port learn MAC addresses?()

  • A、Blocking
  • B、Listening
  • C、Forwarding
  • D、Learning
  • E、Relaying

相似考题
更多“In which Spanning-Tree states does a switch port learn MAC addresses?()A、BlockingB、ListeningC、ForwardingD、LearningE、Relaying”相关问题
  • 第1题:

    A network administrator needs to configure port security on a switch.which two statements are true? ()

    A.The network administrator can apply port security to dynamic access ports

    B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

    C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

    D.The network administrator can apply port security to EtherChannels.

    E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.


    参考答案:C, E

  • 第2题:

    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()

    • A、The port’s violation mode is set to restrict
    • B、The port is shut down
    • C、The MAC address table is cleared and the new MAC address is entered into the table
    • D、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

    正确答案:B

  • 第3题:

    A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()

    • A、Switch(config)#spanning-tree loopguard default
    • B、Switch(config-if)#spanning-tree bdpufilter
    • C、Switch(config)#udld aggressive
    • D、Switch(config-if)#spanning-tree bpduguard

    正确答案:A

  • 第4题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第5题:

    What Cisco technology protects against Spanning-Tree Protocol manipulation?()

    • A、 Spanning tree protect
    • B、 Root Guard and BPDU Guard
    • C、 Unicast Reverse Path Forwarding
    • D、 MAC spoof guard
    • E、 Port Security

    正确答案:B

  • 第6题:

    Which three port states are used by RSTP 802.1w?()

    • A、Listening
    • B、Learning
    • C、Forwarding
    • D、Blocking
    • E、Discarding
    • F、Disabled

    正确答案:B,C,E

  • 第7题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第8题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第9题:

    单选题
    What Cisco technology protects against Spanning-Tree Protocol manipulation?()
    A

     Spanning tree protect

    B

     Root Guard and BPDU Guard

    C

     Unicast Reverse Path Forwarding

    D

     MAC spoof guard

    E

     Port Security


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address.

    C

    VTP revision number

    D

    highest port priority number.

    E

    path cost


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    path cost


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    In which Spanning-Tree states does a switch port learn MAC addresses?()
    A

    Blocking

    B

    Listening

    C

    Forwarding

    D

    Learning

    E

    Relaying


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?()

    A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.

    B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.

    C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.

    D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.


    参考答案:C

  • 第14题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address
    • C、VTP revision number
    • D、highest port priority number
    • E、path cost

    正确答案:E

  • 第15题:

    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()

    • A、path cost
    • B、lowest port MAC address
    • C、VTP revision number
    • D、highest port priority number
    • E、port priority number and MAC address

    正确答案:A

  • 第16题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第17题:

    Which two states are the port states when RSTP has converged?()

    • A、blocking
    • B、learning
    • C、discarding
    • D、forwarding
    • E、listening

    正确答案:C,D

  • 第18题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address.
    • C、VTP revision number
    • D、highest port priority number.
    • E、path cost

    正确答案:E

  • 第19题:

    When a switch port is used as a VLAN trunk, which of the following trunk modes are valid?()

    • A、Blocking
    • B、Auto
    • C、Desirable
    • D、On
    • E、Transparent
    • F、Learning

    正确答案:B,C,D

  • 第20题:

    多选题
    A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()
    A

    Uplink Ethernet ports or border ports

    B

    Appliance ports

    C

    Server ports

    D

    Fabric ports

    E

    Backplane ports

    F

    vEth interfaces

    G

    A Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.


    正确答案: A,F
    解析: 暂无解析

  • 第21题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第22题:

    单选题
    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()
    A

    The port’s violation mode is set to restrict

    B

    The port is shut down

    C

    The MAC address table is cleared and the new MAC address is entered into the table

    D

    The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()
    A

    path cost

    B

    lowest port MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    port priority number and MAC address


    正确答案: C
    解析: 暂无解析