单项选择题
You work as a network engineer for . You study the exhibit carefully. From the configuration shown,
what can be determined?()
Exhibit:
A.The remaining secure MAC addresses will be dynamically learned, converted to sticky secure MAC addresses, and added to the running configuration.
B.Since a voice VLAN is configured in this example, port security should be set for a maximum of 2.
C.The sticky addresses will only be those manually configured MAC addresses enabled with the sticky keyword.
D.A security violation will restrict the number of addresses to a maximum of 10 addresses per access VLAN and voice VLAN. The port will be shut down if more than 10 devices per VLAN attempt to access the port.
相关考题
-
单项选择题
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
A.No more than one secure MAC address should be set.
B.The default will be set.
C.The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D.No value is needed if the switchport priority extend command is configured.
E.No more than two secure MAC addresses should be set. -
单项选择题
WhenconfiguringportsecurityonaCiscoCatalystswitchport,whatisthedefaultactiontakenbytheswitchifaviolationoccurs?()
A.protect (drop packets with unknown source addresses)
B.restrict (increment SecurityViolation counter)
C.shut down (access or trunk port)
D.transition (the access port to a trunking port) -
单项选择题
Whatisanimportantsteptotakewhenverifyinganewlyproposednetworksecuritysolution?()
A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.
