Refer to the exhibit.
What type of attack is being defended against? ()
A. snooping attack
B. rogue device attack
C. STP attack
D. VLAN attack
E. spoofing attack
F. MAC flooding attack
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.
What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?()
A. The traffic will be forwarded to the router processor for further processing.
B. The traffic will be dropped.
C. The traffic will be forwarded to the TCAM for further processing.
D. The traffic will be forwarded without further processing.
Refer to the exhibit.
What will happen when one more user is connected to interface FastEthernet 5/1?()
A. The first address learned on the port will be removed from the secure address list and be replaced with the new address.
B. All secure addresses will age out and be removed from the secure address list. This will cause the security violation counter to increment.
C. The packets with the new source addresses will be dropped until a sufficient number of secure MAC addresses are removed from the secure address list.
D. The interface will be placed into the error-disabled state immediately, and an SNMP trap notification will be sent.
Refer to the exhibit. The show port-security interface fa0/1 command was issued on switch SW1. Given the output that was generated,
which two security statement are true? ()
A. Interface FastEthernet 0/1 was configured with the switchport port-security aging command.
B. Interface FastEthernet 0/1 was configured with the switchport port-security protect command.
C. Interface FastEthernet 0/1 was configured with the switchport port-security violation restrict command.
D. When the number of secure IP addresses reaches 10, the interface will immediately shut down.
E. When the number of secure MAC addresses reaches 10, the interface will immediately shut down and an SNMP trap notification will be sent.
Switch R1 has been configured with Private VLANs.
With that type of PVLAN port should the default gateway be configured?()
A. Trunk
B. Isolated
C. Primary
D. Community
E. Promiscuous
F. None of the other alternatives apply
What is true about access control on bridged and routed VLAN traffic? ()
A. Router ACLs can be applied to the input and output directions of a VLAN interface.
B. Bridged ACLs can be applied to the input and output directions of a VLAN interface.
C. Only router ACLs can be applied to a VLAN interface.
D. VLAN maps and router ACLs can be used in combination.
E. VLAN maps can be applied to a VLAN interface
最新試題
How are STP timers and state transitions affected when a topology change occurs in an STP environment?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
Which two statements about the various implementations of STP are true?()
Which statement is correct about RSTP port roles?()
What must be the same to make multiple switches part of the same Multiple Spanning Tree (MST)?()
Refer to the exhibit. Which statement is true about the output?()