网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.

B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.

C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.

D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.


参考答案

更多 “ A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security. ” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

考题 The Ezonexam network administrator needs to a switch named VE1 to become the root bridge for a redundant path switched network. What can be done to ensure that VE1 will always assume the role as the root bridge?A.Assign the switch a higher MAC address than the other switches in the network haveB.Establish a direct link from the switch to all other switches in the networkC.Configure the switch full-duplex operation and configure the other switches for half-duplex operationD.Configure the switch so that it has lower priority than other switches in the networkE.None of the above

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 Which two statements are true about voice VLANs?()A、Voice VLANs are only used when connecting an IP phone and a host to distinct switch portsB、Access ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesC、Access ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneD、Voice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandE、Voice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portF、Enabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

考题 An attacker is launching a DoS attack on the Company network using a hacking tool designed to  exhaust the IP address space available from the DHCP servers for a period of time.  Which  procedure would best defend against this type of attack? ()A、 Configure only trusted interfaces with root guard.B、 Implement private VLANs (PVLANs) to carry only user traffic.C、 Implement private VLANs (PVLANs) to carry only DHCP traffic.D、 Configure only untrusted interfaces with root guard.E、 Configure DHCP spoofing on all ports that connect untrusted clients.F、 Configure DHCP snooping only on ports that connect trusted DHCP servers.G、 None of the other alternatives apply

考题 An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address,subnet mask,and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch port.F、The switch must be fully configured as an SNMP agent.

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 Which two of the following steps are necessary to configure inter-VLAN routing between multilayer switches?()A、Configure a dynamic routing protocol.B、Configure SVI interfaces with IP addresses and subnet masks.C、Configure switch ports with network addresses.D、Configure switch ports with the autostate exclude command.E、Document the MAC addresses of the switch ports.

考题 A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A、Establish a direct link from the switch to all other switches in the network.B、Assign the switch a higher MAC address than the other switches in the network have.C、Configure the switch so that it has a lower priority than other switches in the network.D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

考题 An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address, subnet mask, and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

考题 A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

考题 When configuring unified ports on a 5548 switch, which port ordering must be respected?()A、 Fibre Channel ports must be configured from the first port in the module.B、 Ethernet ports must be configured from the last port in the module.C、 Fibre Channel ports must be configured from the last port in the module.D、 Ethernet ports must be configured from the first port in the module.

考题 You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

考题 单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()A Install the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.B Open Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.C Install Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.D Open Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 单选题Recently traffic to the company web server has more than doubled, resulting in slower response times from the server.  An administrator has decided to add a second, identical 10/100/1000 NIC to the server.  The server is presently connected to a 10/100/1000 switch, with four open ports on the switch.  Which of the following is the BEST solution to speed up web traffic?()A Free up more ports on the switchB Enable server load balancingC Move the second network adapter to a new subnetD Enable network adapter teaming

考题 单选题You are a network administrator of a large investor relations company that uses a switchednetwork to carry both data and IP telephony services. Why should you carry voice traffic on aseparate VLAN?()A IP phones require inline power and must be in separate VLAN to receive inline powerB IP telephony applications require prioritization over other traffic as they are more delaysensitiveC IP phones can only receive IP addresses through DHCP if they are in separate VLAND The CDP frames from the IP phone can only be recognized by the switch if the phone is in anauxiliary vlan

考题 多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address,subnet mask,and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch port.FThe switch must be fully configured as an SNMP agent.

考题 多选题Which two statements are true about voice VLANs?()AVoice VLANs are only used when connecting an IP phone and a host to distinct switch portsBAccess ports that are configured with voice VLANs will always trust the CoS that is received from IP phonesCAccess ports that are configured with voice VLANs may or may not override the CoS value that is received from an IP phoneDVoice VLANs are configured using the switchport voice vlan vlan-ID interface configuration commandEVoice VLANs provide a trunking interface between an IP phone and an access port on a switch to allow traffic from multiple devices that are connected to the portFEnabling Voice VLAN on a switch port will automatically configure the port to trust the incoming CoS markings

考题 多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address, subnet mask, and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.