网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()
A

IPSec VPN

B

SSL VPN

C

port security

D

port security with statically configured MAC addresses

E

private VLANs


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()A IPSec VPNB SSL VPNC port securityD port security with statically configured MAC addressesE private VLANs” 相关考题
考题 An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A、port-based radiusB、802.1q trunkingC、inline powerD、protected port

考题 Which VPN management feature would be considered to ensure that the network had the leastdisruption of service when making topology changes?()A、 dynamic reconfigurationB、 path MTU discoveryC、 auto setupD、 remote management

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)A、The WAN link is down.B、IPSec is enabled on the WX.C、Traceroute is enabled for compression.D、The network is configured using static routes.E、The local and remote cables are accidentally swapped.

考题 Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()A、dynamic reconfigurationB、path MTU discoveryC、auto setupD、remote management

考题 As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard

考题 Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs

考题 Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP

考题 Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

考题 An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

考题 What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

考题 Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()A Multilayer switchB CSUC Proxy serverD IDS

考题 单选题Which of the following would be the way to prevent the Num Lock LED from being turned on automatically when a laptop is booted? ()A Hold the function Num Lock key down during POST.B Go into the Windows Keyboard applet and deselect the ’Num Lock on boot’ option.C Create a Windows profile to disable the feature during power-on self test (POST).D Turn the feature off in the BIOS.

考题 单选题Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()A Run TRACERT from the users workstation.B Start with the Last Known Good Configuration and reboot the computer.C Replace the network interface card (NIC).D PING the users workstation.

考题 单选题Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A port-based radiusB 802.1q trunkingC inline powerD protected port

考题 单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A Disable SSIDB WPAC MAC filteringD RAS

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 多选题Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)AThe WAN link is down.BIPSec is enabled on the WX.CTraceroute is enabled for compression.DThe network is configured using static routes.EThe local and remote cables are accidentally swapped.

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A NATB DynamicC SubnettingD Static