网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()
A

 DHCP spoofing and SPAN cannot be used on the same port of a switch.

B

 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.

C

 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.

D

 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.

E

 None of the other alternatives apply.


参考答案

参考解析
解析: 暂无解析
更多 “单选题The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A  DHCP spoofing and SPAN cannot be used on the same port of a switch.B  To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C  To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D  DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E  None of the other alternatives apply.” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?() A.IDSB.IPSC.FirewallD.Managed PKI

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 Which switch should be used with the ipconfig command if an administrator wants to test the functionality of a DHCP server?() A. /renewB. /flushdnsC. /releaseD. /all

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

考题 Which switch should be used with the ipconfig command if an administrator wants to test the functionality of a DHCP server?()A、 /renewB、 /flushdnsC、 /releaseD、 /all

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

考题 The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 An administrator has set up a company’s intranet server.Users should be able to access it but nousers are able to.The administrator verifies that the website is accessible by IP address.Which of the following should the administrator look at FIRST to resolve the issue?()A、WINS serverB、DNS serverC、Lmhosts fileD、DHCP cache

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 An administrator is troubleshooting issues on an application server.After a root cause analysis,the administrator has determined that there were some unauthorized logins to the server.Which of the following locations would BEST help to determine details about the unauthorized logins?()A、Active DirectoryB、DHCP logsC、Security logsD、System logs

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()A Multilayer switchB CSUC Proxy serverD IDS

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A  DHCP spoofing and SPAN cannot be used on the same port of a switch.B  To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C  To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D  DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E  None of the other alternatives apply.

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA Power UsersB UsersC GuestsD Administrato

考题 单选题Which switch should be used with the ipconfig command if an administrator wants to test the functionality of a DHCP server?()A /renewB /flushdnsC /releaseD /all

考题 单选题A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A Security CenterB Event Viewer Security logC Windows DefenderD Windows Firewall