單項(xiàng)選擇題

Refer to the exhibit. Port security has been configured on the switch port Fa0/5. 
What would  happen if another device is connected to the port after the maximum number of devices has been  reached, even if one or more of the original MAC addresses are inactive?()

A. The port will permit the new MAC address because one or more of the original MAC addresses  are inactive.
B. The port will permit the new MAC address because one or more of the original MAC addresses  will age out.
C. Because the new MAC address is not configured on the port, the port will not permit the new  MAC address.
D. Although one or more of the original MAC addresses are inactive, the port will not permit the  new MAC address.


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題

Refer to the exhibit. 
What is the problem with this configuration?()

 

A. Spanning tree PortFast cannot be configured on a port where a voice VLAN is configured.
B. Sticky secure MAC addresses cannot be used on a port when a voice VLAN is configured.
C. Spanning tree PortFast cannot be configured on a port when a sticky secure MAC address is  used.
D. The switch port must be configured as a trunk.

2.多項(xiàng)選擇題

You need to configure port security on switch R1.
 Which two statements are true about this  technology? ()


A. Port security can be configured for ports supporting VoIP.
B. With port security configured, four MAC addresses are allowed by default.
C. The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
D.  Withsecurity configured, only one MAC addresses is allowed by default.  
E. Port security cannot be configured for ports supporting VoIP.


3.多項(xiàng)選擇題

Refer to the exhibit. Based on the running configuration that is shown for interface  FastEthernet0/2, 
what two conclusions can be deduced?()

A. Connecting a host with MAC address 0000.0000.4147 will move interface FastEthernet0/2 into  error disabled state.
B. The host with address 0000.0000.4141 is removed from the secure address list after 5 seconds  of inactivity.
C. The sticky secure MAC addresses are treated as static secure MAC addresses after the  running configuration is saved to the startup configuration and the switch is restarted.
D. Interface FastEthernet0/2 is a voice VLAN port.
E. The host with address 0000.0000.000b is removed from the secure address list after 300  seconds.

4.單項(xiàng)選擇題

Refer to the exhibit.
 Which interface or interfaces on switch SW_A can have the port security  feature enabled?()

A. Ports 0/1 and 0/2
B. The trunk port 0/22 and the EtherChannel ports
C. Ports 0/1, 0/2 and 0/3
D. Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports
E. Port 0/1
F. Ports 0/1, 0/2, 0/3 and the trunk port 0/22

5.單項(xiàng)選擇題

A Company switch was configured as shown below: 
switchport mode access  switchport port-security  
switchport port-security maximum 2
switchport port-security mac-address 0002.0002.0002  
switchport port-security violation shutdown  
Given the configuration output shown above, 
what happens when a host with the MAC address of  0003.0003.0003 is directly connected to the switch port? ()

A. The host will be allowed to connect.
B. The port will shut down.
C. The host can only connect through a hub/switch where 0002.0002.0002 is already connected.  
D. The host will be refused access.
E. None of the other alternatives apply

最新試題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:?jiǎn)雾?xiàng)選擇題

Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()

題型:多項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Which two statements are true about BPDU port-guard and BPDU filtering?()

題型:多項(xiàng)選擇題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:?jiǎn)雾?xiàng)選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題