1.A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A: BPDU
B: port security
C: RSTP
D: STP
E: VTP
F: blocking mode
Correct Answers: B
2.Which of the following statements are true regarding the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)
A:The command is used to establish a static route.
B:The default administrative distance is used.
C:The command is used to configure the default route.
D:The subnet mask for the source address is 255.255.255.0.
E:The command is used to establish a stub network.
Correct Answers: A, B
3.After the show ip route command has been entered, the following routes are displayed. Which route will not be entered into the routing table of a neighboring router?
A: R 192.168.8.0/24 [120/1] via 192.168.2.2, 00:00:10, Serial0
B: R 192.168.11.0/24 [120/7] via 192.168.9.1, 00:00:03, Serial1
C: C 192.168.1.0/24 is directly connected, Ethernet0
D: R 192.168.5.0/24 [120/15] via 192.168.2.2, 00:00:10, Serial0
Correct Answers: D
4.How will Spanning Tree affect the operation of the network devices shown in the graphic?
版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明!