You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?
1. Switch (config-if) # ip access-group 10
2. Switch (config-if) # switchport port-security maximum 1
3. Switch (config) # access-list 10 permit ip host 1
4. Switch (config-if) # switchport port-security violation shutdown
5. Switch (config) # mac-address-table secure
A. 1 and 3
B. 2 and 4
C. 2, 3 and 5
D. 4 and 5
Answer: Option B
Solution(By Examveda Team)
Theswitchport port-security
is an important command, and it's super easy with the CNA; however, from the CLI, you can set the maximum number of MAC addresses allowed into the port, and then set the penalty if this maximum has been passed. What is the purpose of Spanning Tree Protocol in a switched LAN?
A. To provide a mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage the VLAN database across multiple switches
E. To create collision domains
Which statement describes a spanning-tree network that has converged?
A. All switch and bridge ports are in the forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.
A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution
A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In an improperly implemented redundant topology
Join The Discussion