网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)

A.Blocking

B.Listening

C.Forwarding

D.Learning

E.Relaying


参考答案

更多 “ In which Spanning-Tree states does a switch port learn MAC addresses? (Select two)A.BlockingB.ListeningC.ForwardingD.LearningE.Relaying ” 相关考题
考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?A. path costB. lowest port MAC addressC. VTP revision numberD. highest port priority numberE. port priority number and MAC addressF. None of the above

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Which of the following are true regarding bridges and switches?() A. Bridges are faster than switches because they have fewer ports.B. A switch is a multiport bridge.C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame received.D. A bridge will forward a broadcast but a switch will not.E. Bridges and switches increase the size of a collision domain.

考题 Anetworkadministratormustconfigure200switchportstoaccepttrafficfromonlythecurrentlyattachedhostdevices.WhatwouldbethemostefficientwaytoconfigureMAC-levelsecurityonalltheseports?() A.Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B.Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C.Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D.Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC addressC、VTP revision numberD、highest port priority numberE、path cost

考题 A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state,  which command should be configured to satisfy the requirement?()A、Switch(config)#spanning-tree loopguard defaultB、Switch(config-if)#spanning-tree bdpufilterC、Switch(config)#udld aggressiveD、Switch(config-if)#spanning-tree bpduguard

考题 Which two statements are true when the extended system ID feature is enabled? ()A、The BID is made up of the bridge priority value(two bytes) and bridge MAC address (six bytes).B、The BID is made up of the bridge priority (four bits), the system ID (12 bits), and a bridge MAC address (48 bits).C、The BID is made up of the system ID (six bytes) and bridge priority value (two bytes).D、The system ID value is the VLAN ID (VID).E、The system ID value is a unique MAC address allocated from a pool of MAC addresses assigned to the switch or module.F、The system ID value is a hex number used to measure the preference of a bridge in the spanning-tree algorithm.

考题 Select the action that results from executing these commands. Switch(config-if)# switchport port-security. Switch(config-if)# switchport port-security mac-address sticky()A、A dynamically learned MAC address is saved in the startup-configuration file.B、A dynamically learned MAC address is saved in the running-configuration file.C、A dynamically learned MAC address is saved in the VLAN database.D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

考题 What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A、path costB、lowest port MAC addressC、VTP revision numberD、highest port priority numberE、port priority number and MAC address

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()A、 Uplink Ethernet ports or border portsB、 Appliance portsC、 Server portsD、 Fabric portsE、 Backplane portsF、 vEth interfacesG、 A Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

考题 What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A、lowest port MAC addressB、port priority number and MAC address.C、VTP revision numberD、highest port priority number.E、path cost

考题 Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

考题 What is valid reason for a switch to deny port access to new devices when port security is enabled?()A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.B、The denied MAC address are statically configured on the port.C、The minimum MAC threshold has been reached.D、The absolute aging times for the denied MAC addresses have expired.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 In which Spanning-Tree states does a switch port learn MAC addresses?()A、BlockingB、ListeningC、ForwardingD、LearningE、Relaying

考题 多选题A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()AUplink Ethernet ports or border portsBAppliance portsCServer portsDFabric portsEBackplane portsFvEth interfacesGA Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC address.C VTP revision numberD highest port priority number.E path cost

考题 单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A The port’s violation mode is set to restrictB The port is shut downC The MAC address table is cleared and the new MAC address is entered into the tableD The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

考题 单选题What value is primarily used to determine which port becomes the root port on each nonroot switch in a spanning-tree topology?()A lowest port MAC addressB port priority number and MAC addressC VTP revision numberD highest port priority numberE path cost

考题 单选题What value is primarily used to determine which port becomes the root port on each non root switch in a spanning-tree topology?()A path costB lowest port MAC addressC VTP revision numberD highest port priority numberE port priority number and MAC address

考题 多选题In which Spanning-Tree states does a switch port learn MAC addresses?()ABlockingBListeningCForwardingDLearningERelaying