In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)A.BlockingB.ListeningC.ForwardingD.LearningE.Relaying

题目

In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)

A.Blocking

B.Listening

C.Forwarding

D.Learning

E.Relaying


相似考题
更多“In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)A.BlockingB.ListeningC.ForwardingD.LearningE.Relaying”相关问题
  • 第1题:

    Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?()

    A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.

    B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.

    C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.

    D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.


    参考答案:C

  • 第2题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address
    • C、VTP revision number
    • D、highest port priority number
    • E、path cost

    正确答案:E

  • 第3题:

    Which two statements are true when the extended system ID feature is enabled? ()

    • A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).
    • B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).
    • C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).
    • D、The system ID value is the VLAN ID (VID).
    • E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.
    • F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

    正确答案:B,D

  • 第4题:

    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()

    • A、path cost
    • B、lowest port MAC address
    • C、VTP revision number
    • D、highest port priority number
    • E、port priority number and MAC address

    正确答案:A

  • 第5题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第6题:

    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()

    • A、lowest port MAC address
    • B、port priority number and MAC address.
    • C、VTP revision number
    • D、highest port priority number.
    • E、path cost

    正确答案:E

  • 第7题:

    What is valid reason for a switch to deny port access to new devices when port security is enabled?()

    • A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
    • B、The denied MAC address are statically configured on the port.
    • C、The minimum MAC threshold has been reached.
    • D、The absolute aging times for the denied MAC addresses have expired.

    正确答案:B

  • 第8题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第9题:

    多选题
    A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()
    A

    Uplink Ethernet ports or border ports

    B

    Appliance ports

    C

    Server ports

    D

    Fabric ports

    E

    Backplane ports

    F

    vEth interfaces

    G

    A Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.


    正确答案: A,F
    解析: 暂无解析

  • 第10题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address.

    C

    VTP revision number

    D

    highest port priority number.

    E

    path cost


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()
    A

    lowest port MAC address

    B

    port priority number and MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    path cost


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    In which Spanning-Tree states does a switch port learn MAC addresses?()
    A

    Blocking

    B

    Listening

    C

    Forwarding

    D

    Learning

    E

    Relaying


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()

    • A、The port’s violation mode is set to restrict
    • B、The port is shut down
    • C、The MAC address table is cleared and the new MAC address is entered into the table
    • D、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

    正确答案:B

  • 第14题:

    A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()

    • A、Switch(config)#spanning-tree loopguard default
    • B、Switch(config-if)#spanning-tree bdpufilter
    • C、Switch(config)#udld aggressive
    • D、Switch(config-if)#spanning-tree bpduguard

    正确答案:A

  • 第15题:

    Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()

    • A、A dynamically learned MAC address is saved in the startup-configuration file.
    • B、A dynamically learned MAC address is saved in the running-configuration file.
    • C、A dynamically learned MAC address is saved in the VLAN database.
    • D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
    • E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

    正确答案:B

  • 第16题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第17题:

    A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()

    • A、 Uplink Ethernet ports or border ports
    • B、 Appliance ports
    • C、 Server ports
    • D、 Fabric ports
    • E、 Backplane ports
    • F、 vEth interfaces
    • G、 A Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

    正确答案:B,C,E,F

  • 第18题:

    Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()

    • A、Configure a dynamic routing protocol.
    • B、Configure SVI interfaces with IP addresses and subnet masks.
    • C、Configure switch ports with network addresses.
    • D、Configure switch ports with the autostate exclude command.
    • E、Document the MAC addresses of the switch ports.

    正确答案:A,B

  • 第19题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第20题:

    In which Spanning-Tree states does a switch port learn MAC addresses?()

    • A、Blocking
    • B、Listening
    • C、Forwarding
    • D、Learning
    • E、Relaying

    正确答案:C,D

  • 第21题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第22题:

    单选题
    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()
    A

    The port’s violation mode is set to restrict

    B

    The port is shut down

    C

    The MAC address table is cleared and the new MAC address is entered into the table

    D

    The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()
    A

    path cost

    B

    lowest port MAC address

    C

    VTP revision number

    D

    highest port priority number

    E

    port priority number and MAC address


    正确答案: C
    解析: 暂无解析