A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()A、spanningB、address translationC、mirroringD、authentication

题目

A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()

  • A、spanning
  • B、address translation
  • C、mirroring
  • D、authentication
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第2题:

A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

A. Circuit switching

B. Network address translation

C. Power over Ethernet

D. Virtual servers


参考答案:D

第3题:

●Flow control is a function that prevents network congestion by ensuring that (71) do not overwhelm (72) with datA.There are three commonly used methods for handling network congestion . (73) is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74) are used by receiving devices to help prevent their buffers from overflowing . (75) is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

(71)~(72)A.transmitting devices

B.transmitted devices

C.receiving devices

D.received devices

(73)~(75) A.Buffer

B.Source-quench messages

C.Buffering

D.Windowing


正确答案:A,C,C,B,D
【解析】流量控制是一总通过保证发送端发送的数据不会湮没接收端设备来防止网络拥塞的方法。通常有三种常用方法来处理网络拥塞。缓冲是一种通过暂时保存处理不了的数据包的方法,等到数据包能够被处理。源抑至被接收端用来帮助防止它们的缓冲区溢出;窗口机制是一种流量控制机制,利用这种机制,发送端发送一定数量的报文需要对端接收到的报文进行确认。

第4题:

Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

A.transmitting devices

B.transmitted devices

C.receiving devices

D.received devices


正确答案:A

第5题:

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

A.IDS

B.VPN

C.NIPS

D.HIDS


参考答案:C

第6题:

What is the primary purpose of creating a Location Group Policy? ()

A. to associate more than one realm with an authentication server

B. to logically group network access devices and associate them with specific sign-in policies

C. to allow or prevent users from accessing resources in specific locations on the network

D. to define the URL that users of network access devices can use to access the Infranet Controller


参考答案:B

第7题:

Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

A.transmitting devices

B.transmitted devices

C.receiving devices

D.received devices


正确答案:A

第8题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第9题:

A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()

A.spanning

B.address translation

C.mirroring

D.authentication


参考答案:D

第10题:

Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.

B. To limit the number of Layer 2 broadcasts on a particular switch port.

C. To prevent unauthorized hosts from accessing the LAN.

D. To protect the IP and MAC address of the switch and associated ports.

E. To block unauthorized access to the switch management interfaces over common TCP ports.


参考答案:C

更多相关问题