多项选择题
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)()
A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10
相关考题
-
多项选择题
WhydoesthedatacommunicationindustryusethelayeredOSIreferencemodel?(Choosetwo.)()
A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers. -
多项选择题
AninboundaccesslisthasbeenconfiguredonaserialinterfacetodenypacketentryforTCPandUDPports21,23and25.WhattypesofpacketswillbepermittedbythisACL?(Choosethree.)()
A.FTP
B.Telnet
C.SMTP
D.DNS
E.HTTP
F.POP3 -
多项选择题
WhichtwopasswordsmustbesuppliedinordertoconnectbyTelnettoaproperlysecuredCiscoswitchandmakechangestothedeviceconfiguration?(Choosetwo.)()
A.console password
B.vty password
C.aux password
D.tty password
E.enable secret password
F.username password
