單項(xiàng)選擇題

Refer to the exhibit. Which of these statements correctly describes the state of the switch once the boot process has been completed?()

A.As FastEthernet0/12 will be the last to come up, it will not be blocked by STP.
B.Remote access management of this switch will not be possible without configuration change.
C.More VLANs will need to be created for this switch.
D.The switch will need a different IOS code in order to support VLANs and STP.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address sticky

A.A dynamically learned MAC address is saved in the startup-configuration file.
B.A dynamically learned MAC address is saved in the running-configuration file.
C.A dynamically learned MAC address is saved in the VLAN database.
D.Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
E.Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

2.多項(xiàng)選擇題Which two commands correctly verify whether port security has been configured on port FastEthernet 0/12 on a switch?()

A.SW1#show swithport port-security interface FastEthernet 0/12
B.SW1# show swithport port-secure interface FastEthernet 0/12
C.SW1# show port-secure interface FastEthernet 0/12
D.SW1#show running-config
E.SW1#show port-security interface FastEthernet 0/12

3.多項(xiàng)選擇題Which can be done to secure the virtual terminal interfaces on a router?()

A.Administratively shut down the interfaces.
B.Physically secure the interfaces.
C.Configure a virtual terminal password and login process.
D.Enter an access list and apply it to the terminal interfaces using the access-class command.
E.Create an access list and apply it to the terminal interfaces using the access-group command.

4.多項(xiàng)選擇題A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()

A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255
B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255
C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255
D.access-list 10 permit ip 192.168.146.0 0.0.1.255
E.access-list 10 permit ip 192.168.148.0 0.0.1.255
F.access-list 10 permit ip 192.168.146.0 255.255.255.0

5.單項(xiàng)選擇題Which item represents the standard IP ACL?()

A.access-list 50 deny 192.168.1.1 0.0.0.255
B.access-list 110 permit ip any any
C.access-list 2500 deny tcp any host 192.168.1.1 eq 22
D.access-list 101 deny tcp any host 192.168.1.1