网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
A

Configure roles based on departments and assign access based on source IP address.

B

Configure roles based on the user's manager and assign access based on the user's MAC address

C

Configure roles based on group memberships and assign a specific VLAN to the role.

D

Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign access based on source IP address.B Configure roles based on the user's manager and assign access based on the user's MAC addressC Configure roles based on group memberships and assign a specific VLAN to the role.D Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 The Ezonexam network administrator needs to a switch named VE1 to become the root bridge for a redundant path switched network. What can be done to ensure that VE1 will always assume the role as the root bridge?A.Assign the switch a higher MAC address than the other switches in the network haveB.Establish a direct link from the switch to all other switches in the networkC.Configure the switch full-duplex operation and configure the other switches for half-duplex operationD.Configure the switch so that it has lower priority than other switches in the networkE.None of the above

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A.Establish a direct link from the switch to all other switches in the network.B.Assign the switch a higher MAC address than the other switches in the network have.C.Configure the switch so that it has a lower priority than other switches in the network.D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

考题 You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A、Add a Network Adapter.B、Add a Legacy Network Adapter.C、Configure a static MAC address.D、Configure a dynamic MAC address.

考题 A WebSphere Commerce administrator is attempting to invalidate a cached servlet. Which course of action would NOT accomplish this goal?()A、Manually Invalidate the servlet cache through the Cache MonitorB、Configure a Time Based invalidation for the servletC、Call the dynamic cache invalidation API to invalidate the servletD、Manually invalidate the servlet through the Configuration ManagerE、Use the Commerce Accelerator to remove the invalid servlet

考题 A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A、Configure roles based on departments and assign access based on source IP address.B、Configure roles based on the user's manager and assign access based on the user's MAC addressC、Configure roles based on group memberships and assign a specific VLAN to the role.D、Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 The network administrator wants to enable an EtherChannel between two switches in "on" mode. The administrator connects the cables and enables the interfaces, but while configuring the EtherChannel in the first switch,a spanning-tree loop was detected. Which two of these procedures can avoid this problem?()A、Configure the EtherChannel as "desirable" first.B、Assign all interfaces to the same VLAN.C、Disable PortFast on the interfaces in the EtherChannels.D、Disable all interfaces first.E、Fast Ethernet and Gigabit Ethernet ports cannot be assigned to the same EtherChannel.F、Fix cabling problems.

考题 You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()A、TACACS with LEAP extensionsB、RADIUS with EAP extensionsC、TACACS+D、LDAP

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()A、Use any Windows 2000 to graphically access the HMCB、Load, install, and configure WebSM on the workstationC、Telnet to the HMC using Exceed or a GUI emulator product from the workstationD、Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface

考题 You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".B、Configure a wired adapter and assign the required SSID under "User Roles" "Agent" "Odyssey Settings".C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" "Agent" "Odyssey Settings" "Preconfigured Installer".

考题 You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create and share a folder named Sales on a member server. You apply the default share permission and NTFS permissions to Sales. Then you create a folder named SalesForecast in Sales. You apply the default NTFS permissions to SalesForecast. Managers in the sales department are members of a domain user group named SalesManagers. When members of SalesManagers try to add files to SalesForecast,they receive the "Access is denied" error message. You need to configure permissions on these folders to fulfil the following requirements: 1. Members of SalesManagers must be able to create, modify, and delete files in both folders. 2. All other domain users must only be able to read files in both folders. What should you do?()A、Configure the share permissions on Sales to assign the Allow - Change permission to the Everyone group. Configure the NTSF permissions on SalesForecast to assign the Allow - Write permission to the SalesManagers group.B、Configure the share permissions on Sales to assign the Allow - Change permissions to the SalesManagers group. Configure the NTSF permissions on Sales to assign the Allow - Write permissions to the SalesManagers group.C、Configure the share permissions on Sales to assign the Allow - Change permissions to the Everyone group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.D、Configure the share permissions on Sales to assign theAllow - Change permission to the SalesManagers group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.

考题 You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()A、Users in both departments can access to their own files from the network.B、Users in the Accounting department can view the Legal department’s documents.C、Users in the Legal department cannot view the Accounting department’s documents.D、Company managers can access and modify both departments’ files.

考题 单选题You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()A TACACS with LEAP extensionsB RADIUS with EAP extensionsC TACACS+D LDAP

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.

考题 单选题A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()A Use any Windows 2000 to graphically access the HMCB Load, install, and configure WebSM on the workstationC Telnet to the HMC using Exceed or a GUI emulator product from the workstationD Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface

考题 单选题You are a network administrator for your company. The network consists of two Active Directory domains. You are responsible for administering one domain, which contains users who work in the sales department. User objects for the users in the sales department are stored in an organizational unit (OU) named Sales in your domain.   Users in the sales department use a public key infrastructure (PKI) enabled application that requires users to present client authentication certificates before they are granted access. You install Certificate Services on two member servers  running Windows Server 2003. You configure one server as an enterprise subordinate certification authority (CA) and the other server as a stand-alone root CA.   You need to issue certificates that support client authentication to sales users only. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A  Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll users for certificates.B  Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll computers for certificates.C  Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales users for certificates.D  Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales client computers for certificates.