多选题Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()ASW1#show swithport port-security interface FastEthernet 0/12BSW1# show swithport port-secure interface FastEthernet 0/12CSW1# show port

题目
多选题
Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()
A

SW1#show swithport port-security interface FastEthernet 0/12

B

SW1# show swithport port-secure interface FastEthernet 0/12

C

SW1# show port-secure interface FastEthernet 0/12

D

SW1#show running-config


相似考题
更多“Which two commands correctly verify whether port security ha”相关问题
  • 第1题:

    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第2题:

    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()

    • A、show interfaces interface
    • B、show interfaces trunk
    • C、show interfaces switchport
    • D、show ip interface brief
    • E、show interfaces vlan

    正确答案:B,C

  • 第3题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第4题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第5题:

    The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

    • A、TestKing1(config-if)# switchport port-security maximum 1
    • B、TestKing1(config)# mac-address-table secure
    • C、TestKing1(config)# access-list 10 permit ip host
    • D、TestKing1(config-if)# switchport port-security violation shutdown
    • E、TestKing1(config-if)# ip access-group 10

    正确答案:A,D

  • 第6题:

    多选题
    Which two commands can be used to verify a trunk link configuration status on a given cisco switch?()
    A

    show interfaces interface

    B

    show interfaces trunk

    C

    show interfaces switchport

    D

    show ip interface brief

    E

    show interfaces vlan


    正确答案: A,E
    解析: 暂无解析

  • 第7题:

    多选题
    You have a single Active Directory directory service forest named contoso.com. You create baseline  security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are  applied correctly.  What are two possible commands that you can run to achieve this goal?()
    A

    secedit

    B

    gpupdate

    C

    netdom

    D

    scwcmd


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config

    E

    SW1#show port-security interface FastEthernet 0/12


    正确答案: E,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which two commands can be used to verify a trunk link configurationt status on a given cisco switch?()
    A

    show interfaces interface

    B

    show interfaces interface trunk

    C

    show interfaces interface switchport

    D

    show ip interface brief

    E

    show interfaces vlan


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two commands can be used to monitor firewall user authentication?()
    A

    show access firewall-authentication

    B

    show security firewall-authentication users

    C

    show security audit log

    D

    show security firewall-authentication history


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。

    • A、Switch1(config-if)# switchport port-security maximum 1
    • B、Switch1(config)# mac-address-table secure
    • C、Switch1(config)# access-list 10 permit ip host
    • D、Switch1(config-if)# switchport port-security violation shutdown
    • E、Switch1(config-if)# ip access-group 10

    正确答案:A,D

  • 第12题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config
    • E、SW1#show port-security interface FastEthernet 0/12

    正确答案:D,E

  • 第13题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

    正确答案:C

  • 第14题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第15题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第16题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1#show swithport port-secure interface FastEthernet 0/12

    C

    SW1#show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: A,B
    解析: 暂无解析

  • 第17题:

    多选题
    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: C,A
    解析: 暂无解析

  • 第18题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第19题:

    单选题
    Which set of commands is recommended to prevent the use of a hub in the access layer?()
    A

    switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1

    B

    switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1

    C

    switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1

    D

    switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1


    正确答案: C
    解析: 暂无解析