单项选择题
A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
单项选择题 When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()
单项选择题 What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()
多项选择题 What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()