多项选择题Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

A. SW1#show swithport port-security interface FastEthernet 0/12
B. SW1# show swithport port-secure interface FastEthernet 0/12
C. SW1# show port-secure interface FastEthernet 0/12
D. SW1#show running-config
E. SW1#show port-security interface FastEthernet 0/12


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题In an Ethernet network, under what two scenarios can devices transmit?()

A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access

2.多项选择题By default, each port in a Cisco Catalyst switch is assigned to VLAN1. Which two recommendations are key to avoid unauthorized management access?()

A. Create an additional ACL to block the access to VLAN 1.
B. Move the management VLAN to something other than default.
C. Move all ports to another VLAN and deactivate the default VLAN.
D. Limit the access in the switch using port security configuration.
E. Use static VLAN in trunks and access ports to restrict connections.
F. Shutdown all unused ports in the Catalyst switch.

3.多项选择题Which of the following correctly describe steps in the OSI data encapsulation process?()

A. The transport layer divides a data stream into segments and may add reliability and flow control information.
B. The data link layer adds physical source and destination addresses and an FCS to the segment.
C. Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
D. Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
E. The presentation layer translates bits into voltages for transmission across the physical link.

4.多项选择题Which three of these statements regarding 802.1Q trunking are correct?()

A. 802.1Q native VLAN frames are untagged by default.
B. 802.1Q trunking ports can also be secure ports.
C. 802.1Q trunks can use 10 Mb/s Ethernet interfaces.
D. 802.1Q trunks require full-duplex, point-to-point connectivity.
E. 802.1Q trunks should have native VLANs that are the same at both ends.

5.多项选择题Which two of these statements regarding RSTP are correct?()

A. RSTP cannot operate with PVST+.
B. RSTP defines new port roles.
C. RSTP defines no new port states.
D. RSTP is a proprietary implementation of IEEE 802.1D STP.
E. RSTP is compatible with the original IEEE 802.1D STP.

6.多项选择题What are three basic parameters to configure on a wireless access point?()

A.SSID
B.RTS/CTS
C.AES-CCMP
D.TKIP/MIC
E.RF channel
F.authentication method

7.多项选择题Which two of these statements are true of IPv6 address representation?()

A. There are four types of IPv6 addresses: unicast, multicast, anycast, and broadcast.
B. A single interface may be assigned multiple IPv6 addresses of any type.
C. Every IPv6 interface contains at least one loopback address.
D. The first 64 bits represent the dynamically created interface ID.
E. Leading zeros in an IPv6 16 bit hexadecimal field are mandatory.

8.多项选择题Which two statements describe characteristics of IPv6 unicast addressing?()

A. Global addresses start with 2000::/3.
B. Link-local addresses start with FE00:/12.
C. Link-local addresses start with FF00::/10.
D. There is only one loopback address and it is ::1.
E. If a global address is assigned to an interface, then that is the only allowable address for the interface.

9.多项选择题Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies?()

A.copier
B.microwave oven
C.toaster
D.cordless phone
E.IP phone
F.AM radio