A network administrator wants to add a line to an access list that will block only Telnet access by the hosts on subnet 192.168.1.128/28 to the server at 192.168.1.5.What command should be issued to accomplish this task?()
第1题:
A.IDS
B.IPS
C.Firewall
D.Managed PKI
第2题:
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()
A. Disable SSID
B. WPA
C. MAC filtering
D. RAS
第3题:
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)
A. Routers generally cost less than switches
B. Filtering can occur based on Layer 3 information
C. Broadcasts are not forwarded across the router
D. Broadcasts are eliminated
E. Adding a router to the network decreases latency
F. Routers can generally support more LAN ports than switches
第4题:
An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()
第5题:
A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()
第6题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
A. WEP encryption
B. Channel rotation
C. Disable SSID
D. WPA encryption
第7题:
A.netstat
B.traceroute
C.nbtstat
D.ping
第8题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
第9题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第10题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()