单项选择题
Which layer 2 protocol encapsulation type supports synchronous and asynchronous circuis and has built-insecurity mechanisms?()
A.Frame Relay
B.HDLC
C.x.25
D.PPP
相关考题
-
多项选择题
Which two values are used by Spanning Tree Protocol to elect a root bridge?()
A.amount of RAM
B.bridge priority
C.IOS version
D.IP address
E.MAC address
F.speed of the links -
多项选择题
What are two advantages of Layer 2 Ethernet switches over hubs?()
A.decreasing the number of collision domains
B.filtering frames based on MAC addresses
C.allowing simultaneous frame transmissions
D.increasing the size of broadcast domains
E.increasing the maximum length of UTP cabling between devices -
多项选择题
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10
