Network Device Security
SKILLSET
No description available
Related Questions
- Which violation modes do port security support? Choose all that apply.
- Refer to the diagram. On the bottom of the exhibit is the configuration added into Switch SW1. The right side shows a frame coming to switchport fa0/1 of Switch SW1. Which of the following is true based on the diagram and configuration?
- Which of the following commands ensure that only the MAC address of a determined device is allowed in the Switch _SW1 for port Fa0/1 for an unlimited time?
- To help for security and reduce password vulnerability, the command _service password-encryption encrypts passwords so that they cannot be displayed in plain text in a printed version or backup copy of the configuration file. The command influences how IOS saves current and future password for console, vty, enable and username/password.
- A security violation has occurred on a switch port and it has been placed into the ErrDisable state. Which command can be used to reactivate the port?
- Which of the following is not a method for learning addresses in a SwitchPort-Security enabled interface?
- Which port security violation mode will drop all packets from the violating hosts while incrementing the "security-violation" count?
- When setting up port security with sticky MAC Address learning, which of the following action is required?
- This type of secure MAC addresses can be statically or dynamically configured. These addresses are saved in the configuration file or address table.
- Refer to the exhibit. In what occasion will the configuration of interface FastEthernet0/3 in Switch _SW1 will function optimally for a security requirement? ``` -----output omitted------ SW1# show running-config | begin int interface FastEthernet0/1 ! interface FastEthernet0/2 ! interface fastethernet0/3 switchport mode access switchport mode port-security switchport mode port-security mac-address 0200.2222.1111 -----output omitted------ ```