A network administrator wants to control which user hosts ca

题目
单选题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A

BPDU

B

Port security

C

RSTP

D

STP

E

VTP

F

Blocking mode

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第2题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

A. reflexive

B. extended

C. standard

D. dynamic


参考答案:D

第3题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第4题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

  • A、BPDU
  • B、Port security
  • C、RSTP
  • D、STP
  • E、VTP
  • F、Blocking mode

正确答案:B

第5题:

Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()

  • A、 VLAN
  • B、 KVM
  • C、 IP KVM
  • D、 RAID

正确答案:C

第6题:

An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()

A.netstat

B.traceroute

C.nbtstat

D.ping


参考答案:D

第7题:

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

A.IP

B.ICMP

C.TCP

D.UDP


参考答案:B

第8题:

An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?()

A.IDS

B.IPS

C.Firewall

D.Managed PKI


参考答案:A

第9题:

An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()

  • A、 Quotas
  • B、 SNMP
  • C、 Disk management
  • D、 ACL

正确答案:A

第10题:

A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()

  • A、reflexive
  • B、extended
  • C、standard
  • D、dynamic

正确答案:D

更多相关问题