多项选择题
A.enables PortFast
B.disables trunking
C.disables Cisco Discovery Protocol
D.enables port security
E.enables loopguard
F.disables EtherChannel
单项选择题 You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
单项选择题 Three Cisco Catalyst switches have been configured with a first-hop redundancy protocol. While reviewing some show commands, debug output, and the syslog, you discover the following information: What conclusion can you infer from this information?()
单项选择题 You work as a network engineer for . You study the exhibit carefully. Three switches are configured for HSRP. Switch1 remains in the HSRP listen state. What is the most likely cause of this status?()