考题
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
考题
The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A. Micro segmentationB. Transparent switchingC. peer-to-peer networkingD. port securityE. store-and-forward switchingF. virtual local area networks
考题
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.
考题
Why would a network administrator configure port security on a switch()。
A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports
考题
Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access
考题
Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.
考题
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
考题
The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A、One router is running RIPv1.B、RIP neighbor is 224.0.0.9.C、The network contains a loop.D、Network 10.10.1.0 is reachable.
考题
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()A、A switch in the VTP client mode cannot update its local VLAN database.B、A trunk link must be configured between the switches to forward VTP updates.C、A switch in the VTP server mode can update a switch in the VTP transparent mode.D、A switch in the VTP transparent mode will forward updates that it receives to other switches.E、A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F、A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.
考题
A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A、Micro segmentationB、Transparent switchingC、peer-to-peer networkingD、port securityE、store-and-forward switchingF、virtual local area networks
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable
考题
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable
考题
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A
Default gatewayB
The ports on the switchC
Port security on the server's switch portD
Ethernet cable
考题
单选题The network administrator has discovered that the power supply has failed on a switch in the company LAN and that the switch has stopped functioning. It has been replaced with a Cisco Catalyst 2950 series switch.What must be done to ensure that this new switch becomes the root bridge on the network?()A
One router is running RIPv1.B
RIP neighbor is 224.0.0.9.C
The network contains a loop.D
Network 10.10.1.0 is reachable.
考题
单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A
Host B and the switch need to be in the same subnet.B
The switch needs and appropriate default gateway assigned.C
The switch interface connected to the router is down.D
Host B need to be assigned an IP address in vlan 1.E
The switch interfaces need the appropriate IP addresses assigned.
考题
单选题A group of hosts are physically connected to the same switch. The hosts are used by employees of different departments and therefore do not need to directly exchange data on a regular basis.Which technology can a network administrator deploy to reduce unnecessary broadcast traffic between these hosts?()A
Micro segmentationB
Transparent switchingC
peer-to-peer networkingD
port securityE
store-and-forward switchingF
virtual local area networks
考题
单选题Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A
A level 5 password is not setB
The vty password is missingC
The console password is missingD
An ACL is blocking Telnet access
考题
单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A
Default gatewayB
The ports on the switchC
Port security on the servers switch portD
Ethernet cable
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
考题
单选题The Company network administrator needs to enable VTP pruning within the Company network. What action should a network administrator take to enable VTP pruning on an entire management domain?()A
Enable VTP pruning on any switch in the management domainB
Enable VTP pruning on any client switch in the domainC
Enable VTP pruning on a VTP server in the management domainD
Enable VTP pruning on every switch in the domainE
None of the other alternatives apply
考题
单选题Why would a network administrator configure port security on a switch()。A
to prevent unauthorized Telnet access to a switch portB
to limit the number of Layer 2 broadcasts on a particular switch portC
to prevent unauthorized hosts from accessing the LAND
to protect the IP and MAC address of the switch and associated portsE
to block unauthorized access to the switch management interfaces over common TCP ports
考题
单选题Why would a network administrator configure port security on a switch?()A
To prevent unauthorized Telnet access to a switch port.B
To limit the number of Layer 2 broadcasts on a particular switch port.C
To prevent unauthorized hosts from accessing the LAN.D
To protect the IP and MAC address of the switch and associated ports.E
To block unauthorized access to the switch management interfaces over common TCP ports.