单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign acces

题目
单选题
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
A

Configure roles based on departments and assign access based on source IP address.

B

Configure roles based on the user's manager and assign access based on the user's MAC address

C

Configure roles based on group memberships and assign a specific VLAN to the role.

D

Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The Ezonexam network administrator needs to a switch named VE1 to become the root bridge for a redundant path switched network. What can be done to ensure that VE1 will always assume the role as the root bridge?

A.Assign the switch a higher MAC address than the other switches in the network have

B.Establish a direct link from the switch to all other switches in the network

C.Configure the switch full-duplex operation and configure the other switches for half-duplex operation

D.Configure the switch so that it has lower priority than other switches in the network

E.None of the above


正确答案:D

第2题:

A network administrator needs to configure port security on a switch.which two statements are true? ()

A.The network administrator can apply port security to dynamic access ports

B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

D.The network administrator can apply port security to EtherChannels.

E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.


参考答案:C, E

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第5题:

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()

  • A、Upgrade the switches
  • B、Configure BPDU guard
  • C、Configure VLAN access lists
  • D、Configure port security
  • E、Configure Dynamic ARP inspection

正确答案:D

第6题:

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C. Configure the MAC address of the server as a static entry associated with port Fa0/1.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


参考答案:C, E

第7题:

A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。

A.Establish a direct link from the switch to all other switches in the network.

B.Assign the switch a higher MAC address than the other switches in the network have.

C.Configure the switch so that it has a lower priority than other switches in the network.

D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.

E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.


参考答案:C

第8题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第9题:

Why would a network administrator configure port security on a switch?()

  • A、to prevent unauthorized Telnet access to a switch port
  • B、to limit the number of Layer 2 broadcasts on a particular switch port
  • C、to prevent unauthorized hosts from accessing the LAN
  • D、to protect the IP and MAC address of the switch and associated ports
  • E、to block unauthorized access to the switch management interfaces over common TCP ports

正确答案:C

第10题:

You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()

  • A、Add a Network Adapter.
  • B、Add a Legacy Network Adapter.
  • C、Configure a static MAC address.
  • D、Configure a dynamic MAC address.

正确答案:B

更多相关问题