单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.w

题目
单选题
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()
A

Host B and the switch need to be in the same subnet.

B

The switch needs and appropriate default gateway assigned.

C

The switch interface connected to the router is down.

D

Host B need to be assigned an IP address in vlan 1.

E

The switch interfaces need the appropriate IP addresses assigned.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()

A. Telnet sessions from host A to host 5.1.1.10

B. Telnet sessions from host A to host 5.1.3.10

C. Telnet sessions from host B to host 5.1.2.10

D. Telnet sessions from host B to host 5.1.3.8

E. Telnet sessions from host C to host 5.1.3.10

F. Telnet sessions from host F to host 5.1.1.10


参考答案:D, F

第2题:

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C. Configure the MAC address of the server as a static entry associated with port Fa0/1.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


参考答案:C, E

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a(本题)IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network( ),and DHCP is used simply to convey the assigned address to the client.

A.permanent
B.dynamic
C.connection
D.session

答案:B
解析:

第5题:

The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()

A.from host PC1 to host 5.1.1.10

B.from host PC1 to host 5.1.3.10

C.from host PC2 to host 5.1.2.10

D.from host PC2 to host 5.1.3.8


参考答案:B, D

第6题:

Why would a network administrator configure port security on a switch?()

A. To prevent unauthorized Telnet access to a switch port.

B. To limit the number of Layer 2 broadcasts on a particular switch port.

C. To prevent unauthorized hosts from accessing the LAN.

D. To protect the IP and MAC address of the switch and associated ports.

E. To block unauthorized access to the switch management interfaces over common TCP ports.


参考答案:C

第7题:

Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()

A.Host B and the switch need to be in the same subnet.

B.The switch needs and appropriate default gateway assigned.

C.The switch interface connected to the router is down.

D.Host B need to be assigned an IP address in vlan 1.

E.The switch interfaces need the appropriate IP addresses assigned.


参考答案:B

第8题:

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)

A.Configure port Fa0/1 to accept connections only from the static IP address of the server

B.Configure the MAC address of the server as a static entry associated with port Fa0/1

C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectors

D.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server

E.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address


正确答案:BD
解析:Explanation:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. When a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第9题:

Why would a network administrator configure port security on a switch()。

A.to prevent unauthorized Telnet access to a switch port

B.to limit the number of Layer 2 broadcasts on a particular switch port

C.to prevent unauthorized hosts from accessing the LAN

D.to protect the IP and MAC address of the switch and associated ports

E.to block unauthorized access to the switch management interfaces over common TCP ports


参考答案:C

第10题:

The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a( )IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network(本题),and DHCP is used simply to convey the assigned address to the client.

A.controller
B.user
C.host
D.administrator

答案:B
解析:

更多相关问题