多项选择题
A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security
单项选择题 The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
单项选择题 Refer to the exhibit. What is the sequence of events when a VoIP call is placed from IP phone P1 to IP phone P2? ()
单项选择题 Exhibit: You work as a network administrator at. You study the exhibit carefully. In the wireless LAN all devices are configured with static WEP keys. What will happen if the access point receives packets sent by the wireless client adapter that are not encrypted with the appropriate key?()