A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1
第1题:
A network administrator needs to allow only one Telnet connection to a router. For anyone viewing the configuration and issuing the show run command, the password for Telnet access should be encrypted. Which set of commands will accomplish this task?()
A.
B.
C.
D.
第2题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第3题:
Which deployed VoWLAN client security option is recommended by Cisco?()
第4题:
Which of these recommended designs provides the highest availability?()
第5题:
You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()
第6题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第7题:
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
第8题:
Which firewall best practices can help mitigate worm and other automated attacks?()
第9题:
Use the CHANGE_PASSWORD command of the Listener control utility.
Use the SET PASSWORD and SAVE_CONFIG commands of the Listener control utility.
Use the CHANGE_PASSWORD and SAVE_CONFIG commands of the Listener control utility.
Manually modify the listener.ora file to include the password for the listener and restart the listener.
第10题:
In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
第11题:
map the Layer 2 VLAN number to the Layer 3 subnet
control route propagation to edge switches using distribute lists
use a Layer 2 distribution interconnection link with HSRP or GLBP
use a Layer 3 distribution interconnection link with HSRP or GLBP
use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
第12题:
Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through
Layer 3 with Layer 3 Security set to VPN Pass-Through
Layer 2 with Layer 2 Security set to 802.1X
第13题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第14题:
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
第15题:
Which two of these are recommended practices with trunks? ()
第16题:
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
第17题:
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
第18题:
Nexus# conf t Enter configuration commands, one per line. End with CNTL/Z. Nexus(config)# interface Loopback10 % Permission denied Nexus(config)# ? no Negate a command or set its defaults username Configure user information. end Go to exec mode exit Exit from command interpreter What is the reason why this user is not able to enter configuration commands?()
第19题:
Which two of these are recommended practices with trunks?()
第20题:
You want your listener to be password protected to prevent it from being shut down. You want to accomplish this task while the listener is functional. Which method could you use to achieve this objective?()
第21题:
The user did not enter enable prior to going into configuration mode.
The software license installed on Nexus is Layer 2 only, which does not allow the creation of Layer 3 interfaces.
The user RBAC role is set to network-operator.
The user failed authentication and user access defaulted to read-only mode.
The AAA server is currently not responding.
第22题:
Use default Layer 4 hash in core.
Use default Layer 3 hash in distribution.
Use default Layer 4 hash in distribution.
Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
第23题:
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1