单项选择题
Why would a network administrator configure port security on a switch?()
A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
相关考题
-
单项选择题
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?()
A. All defined VLANs are allowed on the trunk by default.
B. Each VLAN, or VLAN range, that is specified with the switchport mode command.
C. Each VLAN, or VLAN range, that is specified with the vtp domain command.
D. Each VLAN, or VLAN range, that is specified with the vlan database command. -
单项选择题
What kind of cable should be used to establish a trunked line between two Catalyst 2950 switches?()
A. a straight-through cable
B. an EIA/TIA-232 serial cable
C. an auxiliary cable
D. a modem cable
E. a cross-over cable -
多项选择题
What components are required to directly connect two PCs so they are able to participate in a simple peer-to-per network?()
A. Straight-through cable
B. Compatible network interfaces
C. Networking protocol
D. Hub
E. Crossover cable
F. router
