Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?()A.SW1#shows withport port-security interface FastEthernet0/12B.SW1#shows withport port-secure interface FastEthernet0/12C.SW1#show port-se

题目
Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?()

A.SW1#shows withport port-security interface FastEthernet0/12

B.SW1#shows withport port-secure interface FastEthernet0/12

C.SW1#show port-secure interface FastEthernet0/12

D.SW1#show running-config


相似考题
更多“Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?() ”相关问题
  • 第1题:

    Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?()

    A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.

    B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.

    C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.

    D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.


    参考答案:C

  • 第2题:

    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 
    • D、Verify that the VLAN virtual interface has been correctly created and enabled.

    正确答案:B

  • 第3题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?()

    • A、SW1#shows withport port-security interface FastEthernet0/12
    • B、SW1#shows withport port-secure interface FastEthernet0/12
    • C、SW1#show port-secure interface FastEthernet0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第4题:

    You have just created a new VLAN on your network.  What is one step that  you should include in your VLAN based implementation and verification plan? ()

    • A、Verify that different native VLANs exist between two switches for security purposes.
    • B、Verify that the VLAN was added on all switches with the use of the show vlan command. 
    • C、Verify that the switch is configured to allow for trunking on the switch ports.
    • D、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.

    正确答案:B

  • 第5题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config
    • E、SW1#show port-security interface FastEthernet 0/12

    正确答案:D,E

  • 第6题:

    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第7题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第8题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第9题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1#show swithport port-secure interface FastEthernet 0/12

    C

    SW1#show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: A,B
    解析: 暂无解析

  • 第10题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第11题:

    单选题
    A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()
    A

    The wrong cable type has been used.

    B

    . IDS has shut down the computer's switch port.

    C

    The port on the switch is configured incorrectly

    D

    Spanning tree protocol was implemented.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()
    A

    Verify that different native VLANs exist between two switches for security purposes.

    B

    Verify that the switch is configured to allow for trunking on the switch ports.

    C

    Verify that each switch port has the proper IP address space assigned to it for the new VLAN. 

    D

    Verify that the VLAN virtual interface has been correctly created and enabled.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Refer to the diagram. Which three statements describe the router port configuration and the switch port configuration as shown in the topology? ()

    A.The Router1 WAN port is configured as a trunking port.

    B.The Router1 port connected to Switch1 is configured using subinterfaces.

    C.The Router1 port connected to Switch1 is configured as 10 Mbps.

    D.The Switch1 port connected to Router1 is configured as a trunking port.

    E.The Switch1 port connected to Host B is configured as an access port.

    F.The Switch1 port connected to Hub1 is configured as full duplex.


    参考答案:B, D, E

  • 第14题:

    Which set of commands is recommended to prevent the use of a hub in the access layer?()

    • A、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1
    • B、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1
    • C、switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1
    • D、switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

    正确答案:C

  • 第15题:

    Which two of the following statements describe a routed switch port on a multilayer switch?()

    • A、Layer 2 switching and Layer 3 routing are mutually supported.
    • B、The port will not be associated with any VLAN.
    • C、The routed switch port supports VLAN subinterfaces.
    • D、The routed switch port is used when a switch has only one port per VLAN or subnet.
    • E、The routed switch port ensures that STP remains in the forwarding state.

    正确答案:B,D

  • 第16题:

    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()

    • A、SW1#show swithport port-security interface FastEthernet 0/12
    • B、SW1# show swithport port-secure interface FastEthernet 0/12
    • C、SW1# show port-secure interface FastEthernet 0/12
    • D、SW1#show running-config

    正确答案:C,D

  • 第17题:

    You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()

    • A、Verify that trunked links are configured to allow the VLAN traffic.
    • B、Verify that the switch is configured to allow for trunking on the switch ports.
    • C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
    • D、Verify that different native VLANs exist between two switches for security purposes.

    正确答案:A

  • 第18题:

    What is valid reason for a switch to deny port access to new devices when port security is enabled?()

    • A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
    • B、The denied MAC address are statically configured on the port.
    • C、The minimum MAC threshold has been reached.
    • D、The absolute aging times for the denied MAC addresses have expired.

    正确答案:B

  • 第19题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第20题:

    A user on a network cannot access any network resources. The link light on the computer showsthat a connection is present. Which of the following is the MOST likely cause of the problem?()

    • A、The wrong cable type has been used.
    • B、. IDS has shut down the computer's switch port.
    • C、The port on the switch is configured incorrectly
    • D、Spanning tree protocol was implemented.

    正确答案:C

  • 第21题:

    多选题
    Which two commands correctly verify whether port security has been configured on portFastEthernet 0/12on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()
    A

    SW1#show swithport port-security interface FastEthernet 0/12

    B

    SW1# show swithport port-secure interface FastEthernet 0/12

    C

    SW1# show port-secure interface FastEthernet 0/12

    D

    SW1#show running-config

    E

    SW1#show port-security interface FastEthernet 0/12


    正确答案: E,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two commands correctly verify whether port security has been configured on port FastEthernet0/12 on a switch?()
    A

    SW1#shows withport port-security interface FastEthernet0/12

    B

    SW1#shows withport port-secure interface FastEthernet0/12

    C

    SW1#show port-secure interface FastEthernet0/12

    D

    SW1#show running-config


    正确答案: A,D
    解析: 暂无解析

  • 第24题:

    单选题
    What is valid reason for a switch to deny port access to new devices when port security is enabled?()
    A

    The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.

    B

    The denied MAC address are statically configured on the port.

    C

    The minimum MAC threshold has been reached.

    D

    The absolute aging times for the denied MAC addresses have expired.


    正确答案: C
    解析: 暂无解析