Ccna certification Practice Tests


  Appendix  ■   Answers to Practice Test Questions  107



Download 8,04 Mb.
Pdf ko'rish
bet508/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   504   505   506   507   508   509   510   511   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

370

 

Appendix 



  Answers to Practice Test Questions



 107.  A.  By default, only a single MAC address is allowed on an interface when port security is 

enabled. All of the other options are incorrect.



 108.  C.  Port security operates at layer 2 by inspecting the source MAC addresses in frames. It 

allows the configured number of source MAC addresses to be switched into the port and 

onto the switch processor. All of the other options are incorrect.

 109.  C.  Configuring port security helps a network administrator prevent unauthorized access 

by MAC address. VLANs can be allowed or disallowed only on a trunk link and not on 

an access link. ACLs can be used to allow or disallow IP addresses. Port security cannot 

be used to prevent unauthorized access by users.



 110.  C.  Port security works best in static environments where there is minimal change to the 

environment. It does not require any more memory since the results are pulled from the 

MAC address table. Port security can work in mobile environments, but depending on the 

configuration, it may become an administrative burden. Port security does not require a 

higher amount of memory. Port security can be configured so that admin intervention to 

reset an err-disabled port is not required.



 111.  B.  Both the computer and the VoIP phone have MAC addresses, and therefore you will 

need to allow the port to have two MAC addresses, one for the phone to communicate 

and the other for the computer to communicate on the port. All of the other options are 

incorrect.



 112.  B.  By default, when port security is configured on a port, the violation method is err-

disabled shutdown. Administratively shut down ports can only be configured by an 

administrator. You can configure port security to restrict access to a MAC address with 

and without logging.



 113.  C.  When port security is configured, the port cannot be in dynamic mode for Dynamic 

Trunking Protocol (DTP) mode. You must configure the port as an access port first, then 

turn off DTP with the command 

switchport nonnegotiate. You can then configure 

switch port security. The commands 

no switchport dynamic and switchport port-

security are incorrect. The commands switchport mode access and switchport 

port-security are incorrect. The commands switchport mode access, no dynamic, 

and 

switchport port-security are incorrect.



 114.  B.  The command 

switchport port-security maximum 2 will configure the port with 

a maximum of two MAC addresses that shall pass through the port. The command 

switchport maximum 2 is incorrect. The command port-security maximum 2 is 

incorrect. The command 

switchport port-security limit 2 is incorrect.



 115.  D.  The command 

switchport port-security violation restrict will set 

the violation mode to restrict. This will drop frames over the maximum number of 

learned MAC addresses and will log security violations to the counters. The command 

switchport port-security violation shutdown is incorrect; this is the default mode 

in which it will enter an err-disabled state upon a violation. The command 

switchport 

port-security restrict is incorrect as it is missing the violation argument. The 

command 

switchport port-security violation protect is incorrect because it will 

not increment the security-violation count while it is dropping frames.



Chapter 5: Security Fundamentals (Domain 5) 


Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   504   505   506   507   508   509   510   511   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish