网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
A

If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.

B

Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.

C

Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.

D

Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.

E

Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.


参考答案

参考解析
解析: 暂无解析
更多 “多选题After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()AIf a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.BEnable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.CConfigure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.DSet the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.EDisable all unused ports and place them in an unused VLAN to avoid unauthorized access.” 相关考题
考题 What are some of the characteristics of a typical VLAN arrangement, found throughout the Ezonexam switched LAN? (Select all that apply)A. VLANs logically divide a switch into multiple, independent switches at Layer 2.B. Trunk links can carry traffic for multiple VLANs.C. VLAN implementation significantly increases traffic due to added trunking information.D. A VLAN can span multiple switches.E. VLANs typically increase the number of switches neededF. VLANs typically decrease the number of switches needed

考题 Which two link protocols are used to carry multiple VLANs over a single link?() A.VTPB.802.1qC.IGPD.ISLE.802.3u

考题 Which spanning tree mode will allow you to put multiple vlans into one instance?

考题 What are some characteristics of the typical VLAN arrangement?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、A VLAN can span multiple switches.E、VLANs extend the collision domain to include multiple switches.F、VLANs typically decrease the number of multiple switches.

考题 A hacker on the Company network is attempting to hop onto a different VLAN.  Which two  statements about VLAN hopping are true? ()A、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.B、 Configuring an interface with the "switchport mode dynamic" command will prevent VLAN  hopping.C、 Attacks are prevented by utilizing the port-security feature.D、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.E、 An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.

考题 Which three statements are typical characteristics of VLAN arrangements?()A、A new switch has no VLANs configured.B、Connectivity between VLANs requires a Layer 3 device.C、VLANs typically decrease the number of collision domains.D、Each VLAN uses a separate address space.E、A switch maintains a separate bridging table for each VLAN.F、VLANs cannot span multiple switches.

考题 What are some of the characteristics of a typical VLAN arrangement?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、A VLAN can span multiple switches.E、VLANs typically increase the number of switches neededF、VLANs typically decrease the number of switches needed

考题 You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()A、generic router and switch configuration parametersB、end-to-end test plan after all components have been installed and  configuredC、administrator assignmentsD、rollback plan

考题 The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 Which of the following can be an expected outcome of a VLAN?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、VLANs can span multiple switches.E、VLANs typically decrease the number of switches needed

考题 Which two link protocols are used to carry multiple VLANs over a single link?()A、VTPB、802.1qC、IGPD、ISLE、802.3u

考题 In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()A、The names of the VLANs used by the SmartPorts are case insensitiveB、The ports may belong to a configurable data VLANC、The names of the VLANs used by the Smartports are not relevantD、The ports may belong to many VLANs, depending on how many PCs are connected to each port.E、The names of the VLANs used by the Smartports are case sensitive

考题 After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.

考题 Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?()A、Eighty percent of traffic on the network is destined for Internet sites.B、There are common sets of traffic filtering requirements for workgroups located in multiple  buildings.C、Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.D、Users are grouped into VLANs independent of physical location.E、None of the other alternatives apply

考题 An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues.  Which of the following is the MOST likely reason for this?()A、 The servers firewall is misconfigured.B、 The server’s timeout feature is set incorrectly.C、 The web server was not installed properly.D、 The company firewall is misconfigured.

考题 Which of the following should an administrator utilize FIRST after installing a new HBA?()A、 New Technology File Systems (NTFS)B、 Digitally signed device driversC、 Virtual machine componentsD、 Multiple RAID configurations

考题 An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed.  Which of the following is the MOST likely cause?()A、 Corrupt file system tableB、 Backplane failureC、 Multiple drive failureD、 Bad cable

考题 Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()A、Very HighB、HighC、ModerateD、LowE、Very Low

考题 单选题Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()A Very HighB HighC ModerateD LowE Very Low

考题 单选题When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()A 802.1q trunkingB VTP trunkingC ISL trunkingD DPT trunking

考题 单选题An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed.  Which of the following is the MOST likely cause?()A  Corrupt file system tableB  Backplane failureC  Multiple drive failureD  Bad cable

考题 单选题Which of the following should an administrator utilize FIRST after installing a new HBA?()A  New Technology File Systems (NTFS)B  Digitally signed device driversC  Virtual machine componentsD  Multiple RAID configurations

考题 单选题When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()A 802.1q trunkingB vtp trunkingC isl trunkingD dpt trunking

考题 单选题An administrator has just installed a web server for the company's Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()A The server's firewall is misconfigured.B The server's timeout feature is set incorrectly.C The web server was not installed properly.D The company firewall is misconfigured.

考题 单选题Which statement is most correct regarding vNICs and VLANs?()A only the default vlan has traffic that is taggedB All vNICs have to be associated with one or more VLANs except for the default vlanC vlan must be configured before configuring them into a vNICD Tagging is done by the operating system NIC if the flag is set to tag traffic

考题 多选题In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()AThe names of the VLANs used by the SmartPorts are case insensitiveBThe ports may belong to a configurable data VLANCThe names of the VLANs used by the Smartports are not relevantDThe ports may belong to many VLANs, depending on how many PCs are connected to each port.EThe names of the VLANs used by the Smartports are case sensitive

考题 多选题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)AUse the custom application feature.BConfigure static NAT for the host.CUse port address translation (PAT).DUse the address-persistent option.

考题 问答题Which spanning tree mode will allow you to put multiple vlans into one instance?