The network administrator has enabled BPDU guard on the LAN.

题目
单选题
The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
A

BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 

B

BPDU guard can guarantee proper selection of the root bridge.

C

BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.

D

BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.

E

None of the other alternatives apply

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()

A. Interfaces will automatically detect and build adjacencies with neighbor routers

B. DR and BDR elections will not occur

C. DR and BDR elections will occur

D. The neighbor command is required to build adjacencies

E. All routers must be configured in a fully meshed topology with all other routers


参考答案:C, D

第2题:

Which spanning-tree command would cause a PortFast-enabled interface to lose its PortFast-operational status and disable BPDU filtering if it receives BPDUs?()

  • A、spanning-tree guard root
  • B、spanning-tree portfast bpduguard default
  • C、spanning-tree bpduguard enable
  • D、spanning-tree bpdufilter enable
  • E、spanning-tree portfast bpdufilter default

正确答案:E

第3题:

The network administrator has just finished installing a new 10/100/1000 switch, but receives reports from the server administrator that servers connected to the new switch seem to be experiencing slow LAN connections. The network administrator checks the port connecting the new switch to the core switch and sees the following information:Which of the following is the MOST likely cause of the slow connections?()

A. The servers have not had VLAN tagging enabled on their NICs.

B. Speed and duplex have not been set.

C. VLAN tagging was not set on the trunk.

D. The servers have been connected with CAT5 cable.


参考答案:B

第4题:

What is the result of entering the command spanning-tree loopguard default?()

  • A、The command enables both loop guard and root guard.
  • B、The command changes the status of loop guard from the default of disabled to enabled.
  • C、The command activates loop guard on point-to-multipoint links in the switched network.
  • D、The command will disable EtherChannel guard.

正确答案:B

第5题:

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()

  • A、loop guard
  • B、storm control
  • C、storm suppression
  • D、broadcast suppression
  • E、BPDU guard

正确答案:B,D

第6题:

Which of the following characteristics describe the BPDU Guard feature()

  • A、ABPDU Guard port should only be configured on ports with PortFast enabled.
  • B、BPDU Guard and PortFast should not be enabled on the same port.
  • C、BPDU Guard is used to ensure that superior BPDUs are not received on a switch port.
  • D、ABPDU Guard port receiving a BPDU will go into err-disablestate.
  • E、ABPDU Guard port receiving a BPDU will be disabled.
  • F、BPDU Guard can be enabled on any switch port.

正确答案:A,E

第7题:

Which of the following characteristics describe the BPDU Guard feature?(Choose all that apply.)()

  • A、A BPDU Guard port should only be configured on ports with PortFast enabled
  • B、BPDU Guard and PortFast should not be enabled on the same port.
  • C、BPDU Guard is used to ensure that superior BPDUs are not received on a switch port
  • D、A BPDU Guard port receiving a BPDU will go into err-disable state
  • E、A BPDU Guard port receiving a BPDU will be disabled
  • F、BPDU Guard can be enabled on any switch port

正确答案:A,E

第8题:

You are a network administrator for Ezonexam.com's Windows 2000 network.

Your network has 200 Windows 2000 Professional computers and 15 Windows 2000 Server computers.

Users on the network save their work files in home folders on a network server. The NTFS partition that contains the home folders has Encrypting File System (EFS) enabled. A user named Jack Bauer leaves the company. You grant her manager the Full Control NTFS permission to Jack's home folder. When the manager attempts to open any of the files, she receives the following error message: "Access is denied."

What should you do?

A.Use System File Checker (SFC) to decrypt the file.

B.Log on the network as the Recovery Agent. Decrypt the files for the manager.

C.Log on the network as the administrator. Use the cipher command to decrypt the files.

D.Log on the network as a member of the Backup Operators group. Decrypt the files for the manager.


正确答案:B
解析:Explanation: A user has asked for EFS to be configured on his or her Windows 2000 Professional computer. You need to enable the Recovery Agent on the computer to be able to unencrypt files if the user's private key has been deleted. In this case Jack left the company and his manager needs access to the files. Even with Full Control NTFS permissions she could not get access, thus you need to make use of the recovery agent to decrypt the files for the manager. Remember that the user who encrypts a file is the only user who can access the file (except for the recovery agent).

Incorrect answers:
A: System file checker (sfc.exe) is a command-line utility that scans and verifies the versions of all protected system files. System file checker (sfc.exe) will discover that a protected file has been overwritten and replace it with the correct version of the file from the %systemroot%\system32\dllcache folder. This is not going to grant the manager access to the files in this case.

C: The Cipher utility allows you to encrypt files and folders as well as check the encryption statistics. But this is not what should be used in this scenario.

D: Membership in the Backup Operators group enables a user to back up and restore file systems regardless of permissions, ownership, encryption settings, or audit settings. Membership in this group enables you to assign users the authority to back up file systems without having to assign the users specific permissions to access the resources. However, this is not what is required here.

第9题:

The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()

  • A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 
  • B、BPDU guard can guarantee proper selection of the root bridge.
  • C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
  • D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
  • E、None of the other alternatives apply

正确答案:D

第10题:

Which two requirements to deploy 6PE and 6VPE solutions are mandatory?()

  • A、MPLS is enabled on the core, distribution, and edge devices.
  • B、A triple stack is enabled on PE devices.
  • C、The network has at least six PE devices.
  • D、A dual stack is enabled on all the P and PE devices in a network.

正确答案:A,D

更多相关问题