Day 45 Back to Exams Page 1. Which port security settings also send an SNMP trap? Choose all that apply.ProtectInformRestrictShutdownQuestion 1 of 18 2. Which command will permit a maximum of 10 MAC addresses to be learned on a port?switchport port-security maximum 10 macswitchport port-security limit10switchport port-security maximum 10switchport port-security 10Question 2 of 18 3. How do you create a timeout on the console (and VTY) lines so that it disconnects after two minutes and thirty seconds of inactivity?Router(config-line)#exec-timeout 2 30Router(config-if)#exec-timeout 2 30Router(config-if)#timeout 2 30Router(config-line)#timeout 2 30Question 3 of 18 4. Which command will disable CDP on an interface?Switch1(config-if)#no cdp runSwitch1(config-if)#cdp disableSwitch1(config-if)#no cdp enableSwitch1(config-if)#no cdpQuestion 4 of 18 5. What does the below configuration tell you? Router(config)#line console 0Router(config-line)#login localThere needs to be a username and password on the routerThere needs to be a TACACS+ server on the networkThe router needs a security imageThere needs to be a VPN to connect to the routerQuestion 5 of 18 6. You see the below output on a show run. Which command has been issued? enable password 7 0822455D0A16 password-protectservice password-md5password-encryptionservice password-encryptionQuestion 6 of 18 7. What two interface types can port security be activated on?AccessManagementDynamicTrunkQuestion 7 of 18 8. Router Logging severity level 3 is known as?informationalemergencyerrorscriticalQuestion 8 of 18 9. Which are valid commands to enable SSH on your switch? (choose 3)crypto key generate rsaip ssh login localip ssh time-out 60ip domain-name mydomain.comQuestion 9 of 18 10. The port security feature is designed to protect the switched LAN from two primary methods of attack. These are?MAC spoofing attacksCAM table overflow attacksWormsDOS attacksQuestion 10 of 18 11. Console logging messages keep appearing as you are typing commands. What do you type to stop this happening but keep logging on?logging synchronous logging delayedlogging interruptlogging nointerruptQuestion 11 of 18 12. The default port security violation action is?RestrictShutdownProtectInformQuestion 12 of 18 13. Which command will set the switch to use an NTP server?Switch(config)#time server 209.184.112.199 Switch(config)#time 209.184.112.199 Switch(config)#ntp 209.184.112.199 Switch(config)#ntp server 209.184.112.199 Question 13 of 18 14. Which command will change the native VLAN on an interface to 888?Switch(config-if)#switchport trunk vlan 888Switch(config-if)#native vlan 888Switch(config-if)#native vlan set 888Switch(config-if)#switchport trunk native vlan 888Question 14 of 18 15. You see the below output for a port security settings. Which configuration command has been used? switchport port-security mac-address sticky 0004.c16f.8741switchport port-security mac-address 0004.c16f.8741switchport port-security mac-address stickyswitchport port-security mac-address sticky 0004.c16f.8741switchport port-security 0004.c16f.8741Question 15 of 18 16. Which command will prevent VLAN 8 from crossing a trunk link?Switch(config-if)#switchport trunk no vlan 8Switch(config-if)#switchport trunk remove 8Switch(config-if)#allowed vlan remove 8Switch(config-if)#switchport trunk allowed vlan remove 8Question 16 of 18 17. Cisco routers have 16 different privilege levels (0 to 15) available to configure, where 15 is full access.FalseTrueQuestion 17 of 18 18. It is very important to remember that when enabling port security on an interface that is also configured with a voice VLAN in conjunction with the data VLAN, the maximum allowed secure addresses on the port should be set to __.4203Question 18 of 18 Loading...