1. What is accomplished by the command switchport port-security violation restrict?
A) The switch will generate a log message but will not block any packet B) The switch will drop packets that are in violation and generate a log message C) The switch will shut down the interface when packets in violation are detected. D) The switch will drop packets that are in violation, but not generate a log message.
2. What attack technique uses double VLAN tagging to access network devices that might not otherwise be accessible?
A) MAC flooding B) Rogue devices C) VLAN hopping D) DHCP spoofing
3. Which of the following capabilities does a multilayer switch possess that an Access layer switch does not? (Choose all that apply.)(Select 2answers)
A) the ability to make forwarding decisions based on host names B) the ability to make forwarding decisions based on UDP/TCP port numbers C) the ability to make forwarding decisions based on IP addresses D) the ability to make forwarding decisions based on MAC addresses
4. Which technology allows for multiple operating systems to be run on a single host computer?
A) virtual device contexts B) network port ID visualization C) Server Virtualization D) virtual routing and forwarding
5. Which statement best describes the function of Hot Standby Router Protocol (HSRP)?
A) HSRP specifies a single IP address that all routers in the group must use. B) HSRP provides a round-robin gateway selection process to increase fault tolerance C) HSRP defines a frame-tagging scheme that allows end stations to use any router as a gateway D) HSRP defines a set of routers that represent one virtual, fault-tolerant router
Leave a comment