-
Which protocol below uses TCP port 443?()
A . HTML
B . HTTPS
C . TFTP
D . Telnet
E . SMTP
-
Your computer has Microsoft Windows Firewall enabled. Your child plays an online game that uses connectionless traffic over port 5678 for inbound and outbound traffic. You need to prevent your child from playing this game. What should you do? ()
A . Enable the User Account Control feature.
B . Configure the user account of your child as a standard user.
C . Create an outbound rule in Windows Firewall to block UDP port 5678.
D . Create an outbound rule in Windows Firewall to block TCP port 5678.
-
Which Cisco IOS command globally enables port-based authentication on a switch? ()
A . aaa port-auth enable
B . radius port-control enable
C . dot1x system-auth-control
D . switchport aaa-control enable
-
Possession of a bill of lading enables the holder()obtain delivery of the goods at the port of destination.
A . to
B . by
C . on
D . i
-
Refer to the exhibit.
Which interface or interfaces on switch SW_A can have the port security feature enabled?()
https://assets.asklib.com/images/image2/2018073010533476447.jpg
A . Ports 0/1 and 0/2
B . The trunk port 0/22 and the EtherChannel ports
C . Ports 0/1, 0/2 and 0/3
D . Ports 0/1, 0/2, 0/3, the trunk port 0/22 and the EtherChannel ports
E . Port 0/1
F . Ports 0/1, 0/2, 0/3 and the trunk port 0/22
-
To enable a tty port to be used for a cu session what must be done to the system?()
A . smit tty; take the defaults and create the desired tty
B . In the /etc/uucp Devices add a line similar to: Direct ttyX - 9600 direct
C . Install bos.net.uucp and the first available tty will be configured for use by a cu session
D . Run the Asynchronous Terminal Emulation (ATE) program and it will configure a tty port for a cu sessio
-
Which is the result of enabling IP Source Guard on an untrusted switch port that does not have DHCP snooping enabled?()
A . DHCP requests will be switched in the software, which may result in lengthy response times.
B . The switch will run out of ACL hardware resources.
C . All DHCP requests will pass through the switch untested.
D . The DHCP server reply will be dropped and the client will not be able to obtain an IP address.
-
You are in charge of a power-driven vessel navigating at night.You sight the red sidelight of another vessel on your port bow.The other vessel’s aft masthead light is to the right of her forward masthead light. You should().
A . stop engines
B . hold course and speed
C . alter course to port
D . sound the danger signal
-
The voice VLAN feature has been enabled on a new Company Catalyst switch port. What is the effect of this? ()
A . The CoS is trusted for 802.1P or 802.1Q tagged traffic.
B . PortFast is disabled on the port.
C . Port Security is automatically enabled on a voice VLAN port.
D . Untagged traffic is sent according to the default CoS priority of the port.
E . None of the other alternatives apply
-
Please arrange()a cleaning gang to sweep out all the ship’s cargo holds to enable her to receive cargo at this port.
A . to
B . with
C . by
D . for
-
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()
A . From Windows Firewall, add an exception
B . From windows Firewall enable the block all incoming connections option
C . From the Windows Firewall with Advanced Security snap-in, create an inbound rule
D . From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
-
When you enable port security on an interface that is also configured with a voice VLAN, what is the maximum number of secure MAC addresses that should be set on the port?()
A . No more than one secure MAC address should be set.
B . The default will be set.
C . The IP phone should use a dedicated port, therefore only one MAC address is needed per port.
D . No value is needed if the switchport priority extend command is configured.
E . No more than two secure MAC addresses should be set.
-
What is valid reason for a switch to deny port access to new devices when port security is enabled?()
A . The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B . The denied MAC address are statically configured on the port.
C . The minimum MAC threshold has been reached.
D . The absolute aging times for the denied MAC addresses have expired.
-
Which three flow-control port states lead to enabled link flow control? ()
A . Receive port: Enabled, Transmit port: Enabled
B . Receive port: Enabled, Transmit port: Desired
C . Receive port: Enabled, Transmit port: Disabled
D . Receive port: Disabled, Transmit port: Desired
E . Receive port: Desired, Transmit port: Desired
-
Refer to the exhibit.
How will interface FastEthernnet0/1 respond when an 802.1x-enabled client connects to the port? ()
https://assets.asklib.com/images/image2/2018073011005317862.jpg
A . The switch will uniquely authorize the client by using the client MAC address.
B . The switch will cause the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate.
C . The switch port will disable 802.1x port-based authentication and cause the port to transition to the authorized state without any further authentication exchange.
D . The switch port will enable 802.1x port-based authentication and begin relaying authentication messages between the client and the authentication server.
-
A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port()。
A . This is a 10 Mb/s switch port
B . This is a 100 Mb/s switch port
C . This is an Ethernet port operating at half duplex
D . This is an Ethernet port operating at full duplex
E . This is a port on a network interface card in a PC
-
You are on watch at sea a man falls overboard on the port side, forward near No. 1 hatch. What of the following should you do first?().
A . Call the master
B . Put the helm hard over toward the port side
C . Sound the alarm to arouse all hands
D . Stop the engine
-
Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 hosts a custom application named App1. App1 is accessible on TCP port 5000.You need to encrypt App1 data on the network.What should you do?()
A . From the Local Security Policy console, configure the Security Options.
B . From the Local Security Policy console, configure the Application Control Policies.
C . From the Windows Firewall with Advanced Security console, create an inbound rule.
D . From the Windows Firewall with Advanced Security console, create a connection security rule.
-
When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()
A . Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.
B . Enter the no switchport command to disable Layer 2 functionality at the interface level.
C . Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.
D . Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.
-
After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()
A . The port’s violation mode is set to restrict
B . The port is shut down
C . The MAC address table is cleared and the new MAC address is entered into the table
D . The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out
-
You have a server that runs windows server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do?()
A.From windows firewall, add an exception.
B.From windows firewall enable the block all incoming connections option.
C.From the windows firewall with advanced security snap-in, create an inbound rule.
D.From the windows firewall with advanced security snap-in, create an outbound rule.
-
关于设备swc的上述配置说法正确的是()[SWC]stp instance 1 priority 4096[SWC]interface Ethernet 1/0/13[SWC-Ethernet 1/0/13]stp point-to-point force-true[SWC]interface Ethernet 1/0/2[SwC-Ethernet 1/0/2]stp edged-port enable
A.stp point-to-point force-true命令是用來标识与 Ethernet1/0/13相连的链路是点到点链路
B.stp instance 1 priority 4096是配置交换机在实例1中的优先级为4096该优先级默认为0
C.stp edged-port enable读命令是诒用交换机SWC的 Ethernet1/0/2为边缘端口
D.通过配置使交换机连接主机的所有以太网端口均被配置为非边缘端口
此题为多项选择题。
-
关于设备SWC的配置说法正确的是【SWC】STP INSTANCE 1 PRIORITY 4096 【SWC】INTERFACE ETHERNET 1/0/12 【SWC-ETHERNER 1/0/12】STP POINT-TO-POINT FORCE-TRUE 【SWC】INTERFACE ETHERNET 1/0/2 【SWC-ETHERNET1/0/2】STP EDGED-PORT ENABLE()
A.stp point-to-point force-true命令是用来标识与ETHERNET1/0/12相连的链路是点到点的链路
B.stp instance 1 priority 4096是配置交换机在实例1中的优先级为4096,该优先级默认为0
C.stp edged-port enable该命令是启用交换机SWC的Ethernet 1/0/2为边缘端口
D.SWC为根交换机
此题为多项选择题。
-
For packets larger than 1642 bytes to pass UNI port, enable()function of the port on
For packets larger than 1642 bytes to pass UNI port, enable()function of the port on ZXCTN equipment.