网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()
A

Attacks are prevented by utilizing the port-security feature.

B

An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.

C

Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.

D

An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.

E

Configuring an interface with the switchport mode access command will prevent VLAN  hopping.


参考答案

参考解析
解析: 暂无解析
更多 “多选题The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()AAttacks are prevented by utilizing the port-security feature.BAn end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.CConfiguring an interface with the switchport mode dynamic command will prevent VLAN  hopping.DAn end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.EConfiguring an interface with the switchport mode access command will prevent VLAN  hopping.” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 A.IPB.ICMPC.TCPD.UDP

考题 The Company administrator has issue the "show vlan id 5" command.  What will this command  display? ()A、 Ports in VLAN 5B、 UtilizationC、 VLAN information on port 0/5D、 FiltersE、 MTU and type

考题 The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA、Power UsersB、UsersC、GuestsD、Administrato

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

考题 You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()A、Enable BPD guardB、Disable CDP on ports where it is not necessaryC、Place unused ports in a common unrouted VLAND、Prevent automatic trunk configurationE、Implement port security

考题 An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI

考题 An administrator has recently added a VLAN to the VIO server and wants to update the documentation. Which command displays the current VIO server VLAN configuration?()A、lsmap -allB、lsmap -netC、lsmap -entD、lsmap -vlan

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()A Multilayer switchB CSUC Proxy serverD IDS

考题 多选题A hacker on the Company network is attempting to hop onto a different VLAN.  Which two  statements about VLAN hopping are true? ()AAn end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.BConfiguring an interface with the switchport mode dynamic command will prevent VLAN  hopping.CAttacks are prevented by utilizing the port-security feature.DConfiguring an interface with the switchport mode access command will prevent VLAN  hopping.EAn end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.

考题 单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A WEP encryptionB Channel rotationC Disable SSIDD WPA encryption

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B The best option is to set up a content filtering feature to comply with the Company.com security policy.C The best option is to create a transport rule to comply with the Company.com security policy.D The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A  DHCP spoofing and SPAN cannot be used on the same port of a switch.B  To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C  To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D  DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E  None of the other alternatives apply.

考题 多选题The Company administrator has issue the "show vlan id 5" command.  What will this command  display? ()APorts in VLAN 5BUtilizationCVLAN information on port 0/5DFiltersEMTU and type

考题 单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode

考题 多选题You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()AEnable BPD guardBDisable CDP on ports where it is not necessaryCPlace unused ports in a common unrouted VLANDPrevent automatic trunk configurationEImplement port security

考题 单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A IPB ICMPC TCPD UDP

考题 单选题A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rsA Power UsersB UsersC GuestsD Administrato