Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network.
How do the switch ports handle the DHCP messages?()
A.Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.
B.Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.
C.Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP request only.
D.All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.
您可能感興趣的試卷
你可能感興趣的試題
Exhibit:
You work as a network administrator at. You study the exhibit carefully.
Which configuration on the HSRP neighboring device ensures that it becomes the active HSRP device in the event that port fa1/1 on 1 goes down? ()
A. 2(config-if)#ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 200 2(config-if)#standby 1 ip 10.10.10.10
B. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 195 2(config-if)#standby 1 preempt 2(config-if)#standby 1 ip 10.10.10.10
C. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 190 2(config-if)#standby 1 ip 10.10.10.10 2(config-if)#standby 1 track interface fa 1/1
D. 2(config-if)# ip address 10.10.10.2 255.255.255.0 2(config-if)#standby 1 priority 200 2(config-if)#standby 1 preempt 2(config-if)#standby 1 ip 10.10.10.10 2(config-if)#standby 1 track interface fa 1/1
You have configured the "config network webmode enable" command on a Cisco device.
What is the purpose of this command? ()
A.To allow HTTP access to the WLAN controller
B.To allow SSH access to the CLI of the WLAN controller
C.To allow SSL access to the CLI of the WLAN controller
D.To allow HTTPS access to the WLAN controller
E.None of the other alternatives apply
A.When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.
B.The voice VLAN feature is enabled by default.
C.The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.
D.The default CoS value is 1 for incoming voice and data traffic.
You work as a network engineer for. You study the exhibit carefully.
What type of attack would be mitigated by this configuration?()
A.CDP manipulation
B.VLAN hopping
C.MAC spoofing
D.MAC flood attack
E.ARP spoofing
F.spanning tree compromises
You want to enhance the security within the LAN and prevent VLAN hopping.
What two steps can be taken to help prevent this?()
A.Enable BPD guard
B.Disable CDP on ports where it is not necessary
C.Place unused ports in a common unrouted VLAN
D.Prevent automatic trunk configuration
E.Implement port security
最新試題
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Which three statements about STP timers are true?()
Which two statements are true about BPDU port-guard and BPDU filtering?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()