A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
您可能感興趣的試卷
你可能感興趣的試題
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command.
A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable
A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router
A. Rollover cable
B. Console cab le
C. Crossover cable
D. Straight-through cable
E. Serial cable
A. A broadcast domain with too many hosts.
B. Full duplex operation.
C. Broadcast storms.
D. Multicasting.
E. Network Segmentation.
F. Low bandwidth.
最新試題
Which statement describes the rule of split horizon?()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()
Which of the following correctly describe steps in the OSI data encapsulation process?()
You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()
Which characteristics are representative of a link-state routing protocol?()
A Router with a BRI/T interface will be used for an ISDN Connection what other ISDN device is required to complete this connection? ()
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
What is the purpose of pressing the Ctrl+Break keys during the router password recover procedure?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()