网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()
A

ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.

B

ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.

C

MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.

D

ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.

E

MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.


参考答案

参考解析
解析: 暂无解析
更多 “多选题The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()AARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.BARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.CMAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.DARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.EMAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()A、Layer 2 modeB、Layer 2 Edge modeC、Layer 3 modeD、Layer 3 In-Band mode

考题 Which deployed VoWLAN client security option is recommended by Cisco?()A、Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB、Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC、Layer 3 with Layer 3 Security set to VPN Pass-ThroughD、Layer 2 with Layer 2 Security set to 802.1X

考题 Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 SSL的全称是()。A、Session Socket LanguageB、Session Software LanguageC、Security Socket LayerD、Security Software Layer

考题 The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

考题 An administrator attempts to open a web page and sees the following error: 'Error 404: Page not found'. The administrator then uses the ping command and finds that the default gateway cannot be pinged. At which of the following layers does the problem MOST likely reside?()A、Layer 1B、Layer 4C、Layer 5D、Layer 7

考题 Your company has an Active Directory Domain Services (AD DS) domain. Al l client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A、Set the security layer op tion to RDP Security Layer.B、Set the encryption level option to FIPS Compliant.C、Set the log on option to Always prompt for password.D、Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authenticat ion.

考题 You are the network administrator for your company. All servers run Windows Server 2003.  Twenty company employees connect to a terminal server named Server2 to run applications and to gain access to the Internet.The 20 employees report that they receive security messages while browsing Internet Web sites.  The employees report that they cannot modify the Internet Explorer security settings on their client computers while connected to Server2.You need to allow these 20 employees to modify the Internet Explorer security settings on their client computers while connected to Server2. What should you do?()A、Log on to Server2 as Administrator and add http:// to the list of trusted sites in Internet Explorer.B、Instruct the 20 employees to add http:// to the list of trusted sites in Internet Explorer on their client computers.C、Instruct the 20 employees to change the Internet Explorer privacy settings on their client computers to Low.D、Uninstall Internet Explorer Enhanced Security Configuration on Server2.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A、 Create a global distribution group in the forest root domain and name it Company Editors.B、 Create a global security group in the forest root domain and name it Company Editors.C、 Create a universal distribution group in the forest root domain and name it Company Editors. D、 Create a universal security group in the forest root domain and name it Company Editors.

考题 You are the network administrator for Company. Many of the employees in the sales department travel on a regular basis and needs to dial into the company network from their Windows 2000 Professional portable computers. Your company recently implemented a new computing security policy that mandates all remote connections be established by a two-way authentication method. You configure a Windows 2000 Server computer to run Routing and Remote Access to meet the requirements of the new security policy. Employees who travel report they can no longer initiate a dial-up connection. You need to give employees who travel the ability to dial in to the company network. What should you do? ()A、Configure the dial-up connection on all of the portable computers to use L2TP.B、Configure the dial-up connection on all of the portable computers to use MS-CHAP v2.C、Apply the Compatws.inf Security Template to all of the portable computers.D、Apply the Hisecws.inf Security Template to all of the portable computers.

考题 单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A Set the security layer option to RDP Security Layer.B Set the encryption level option to FIPS Compliant.C Set the log on option to Always prompt for password.D Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authentication.

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()A  Create a global distribution group in the forest root domain and name it Company Editors.B  Create a global security group in the forest root domain and name it Company Editors.C  Create a universal distribution group in the forest root domain and name it Company Editors. D  Create a universal security group in the forest root domain and name it Company Editors.

考题 单选题You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physicall yand logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. Inwhich access mode has this NAS been configured to operate?()A  Layer 2 modeB  Layer 2 Edge modeC  Layer 3 modeD  Layer 3 In-Band mode

考题 单选题You are the network administrator for Company. Laura is a sales representative for the company. Shetravels on a regular basis and dials into the company network from her Windows 2000 Professionalportable computer. Company recently implemented a new computing security policy that mandates allremote connections be established by a two-way authentication method. You configure a Windows 2000Server computer to run Routing and Remote Access Server for Windows 2000 to meet the requirementsof the new security policy. Laura reports she now cannot initiate a dial-up connection.Laura needs to dial in to the company network. What should you do?()A Apply the Hisecws.inf Security Template to Laura’s computer.B Apply the Compatws.inf Security Template to Laura’s computer.C Instruct Laura to configure her dial-up connection to use multi-link.D Instruct Laura to configure her dial-up connection to use MS-CHAP v2.E Instruct Laura to configure her dial-up connections to use L2TP.

考题 单选题You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()A Run the Secedit.exe command in validation mode and specify the new security template.B Run the Secedit.exe command in configuration mode and specify the new security template. C Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. D Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation. 

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 多选题Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators' computers run Windows 7. You need to ensure the RDP connections are as secure as possible. Which two actions should you perform?()ASet the security layer for each server to the RDP Security Layer.BConfigure the firewall on each server to block port 3389.CAcquire user certificates from the internal certification authority.DConfigure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 单选题Which deployed VoWLAN client security option is recommended by Cisco?()A Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC Layer 3 with Layer 3 Security set to VPN Pass-ThroughD Layer 2 with Layer 2 Security set to 802.1X