网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。
A

Configure port Fa0/1 to accept connections only from the static IP address of the server.

B

Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C

Configure the MAC address of the server as a static entry associated with port Fa0/1.

D

Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E

Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F

Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


参考答案

参考解析
解析: 暂无解析
更多 “多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.” 相关考题
考题 You are a network administrator for your company. All servers run Windows Server 2003.A server named Server1 functions as an application server. Server1 runs several applications. Server1 is located on the company‘s perimeter network. You allow communication to Server1 only over port 80.Users report that applications on Server1 perform poorly during periods of peak activity. You monitor Server1.The results are shown in the exhibit. (Click the Exhibit button.)You need to identify which process is causing Server1 to perform poorly.Which two tools can you use to achieve this goal? ()(Each correct answer presents a complete solution. Choose two.)A. Event ViewerB. Task ManagerC. Network MonitorD. System Monitor

考题 Your network contains a server named Server1 that has Windows Server 2008 R2.An administrator runs the following command on Server1: netsh.exe advfirewall reset You discover that you can no longer access Server1 on port 3389.You need to ensure that you can access Server1 on port 3389.Which firewall rule should you enable?()A. File and Printer Sharing (Echo Request ICMPv4-In)B. File and Printer Sharing (SMB-In)C. Remote Desktop (TCP-In)D. Remote Service Management (RPC)

考题 The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?() A. A switch in the VTP client mode cannot update its local VLAN database.B. A trunk link must be configured between the switches to forward VTP updates.C. A switch in the VTP server mode can update a switch in the VTP transparent mode.D. A switch in the VTP transparent mode will forward updates that it receives to other switches.E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

考题 Refer to the exhibit. Give this output for SwitchC, what should the network administrator‘s next action be?() A.Check the trunk encapsulation mode for SwitchC‘s fa0/1 port.B.Check the duplex mode for SwitchC‘s fa0/1 port.C.Check the duplex mode for SwitchA‘s fa0/2 port.D.Check the trunk encapsulation mode for SwitchA‘s fa0/2 port.

考题 The administrator wants to backup the existing VIO server software and its current configuration before applying an update.  What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A、 mksysb -t vio /mountpointB、 backupios -file /mountpointC、 mksysb -i /mountpoint/vio.mksysbD、 backupios -mksysb -file /mountpoint/vio.mksysb

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

考题 Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

考题 A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

考题 A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A、 Default gatewayB、 The ports on the switchC、 Port security on the servers switch portD、 Ethernet cable

考题 An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

考题 Your network consists of a single Active Directory domain. The network contains two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).You log on to Server1 by using the Administrator account for the domain. You open Event Viewer and attempt to connect to Server2 but receive the following error message.You verify that you can connect to Server2 by using Windows Explorer and that Windows Firewall is disabled on Server2. You open the Services snap-in on Server2 as shown in the exhibit.You need to ensure that you can connect to Server2 remotely by using Event Viewer.  What should you do on Server2?()A、Add the Administrator account to the HelpServicesGroup.B、Set the Startup Type for the Remote Registry service to Automatic and then start the service.C、Set the Startup Type for the Secondary Logon service to Disabled and then stop the service.D、Set the Startup Type for the Special Administration Console Helper service to Automatic and then start the service.

考题 Your network contains an internal network and a perimeter network. You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network. You need to ensure that you can install the Edge Transport server role on the new server.  What should you do()?  A、Join the new server to an Active Directory domain.B、Install Active?Directory Lightweight Directory Services on the new server.C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

考题 You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()A、Disable port 80 on the SUSAdmin Web site.B、Require 128-Bit SSL on all directories related to the SUSAdmin Web site.C、Change the default Web site to require 128-Bit SSL.D、Enable IPSec on Testking2 with the Request Security IPsec template.

考题 Your network contains a server named Server1 that has Windows Server 2008 R2.An administrator runs the following command on Server1: netsh.exe advfirewall reset You discover that you can no longer access Server1 on port 3389.You need to ensure that you can access Server1 on port 3389.Which firewall rule should you enable?()A、File and Printer Sharing (Echo Request ICMPv4-In)B、File and Printer Sharing (SMB-In)C、Remote Desktop (TCP-In)D、Remote Service Management (RPC)

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A Default gatewayB The ports on the switchC Port security on the server's switch portD Ethernet cable

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

考题 多选题A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration? ()AA switch in the VTP client mode cannot update its local VLAN database.BA trunk link must be configured between the switches to forward VTP updates.CA switch in the VTP server mode can update a switch in the VTP transparent mode.DA switch in the VTP transparent mode will forward updates that it receives to other switches.EA switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.FA switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.

考题 单选题An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()A  Default gatewayB  The ports on the switchC  Port security on the servers switch portD  Ethernet cable

考题 多选题A network administrator needs to configure port security on a switch.which two statements are true?()AThe network administrator can apply port security to dynamic access portsBThe network administrator can configure static secure or sticky secure mac addresses in the voice vlan.CThe sticky learning feature allows the addition of dynamically learned addresses to the running configuration.DThe network administrator can apply port security to EtherChannels.EWhen dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 单选题Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A  Verify the configuration of the connected port on the network switch.B  Reboot the server.C  Install a new NIC on the server.D  Verify that network cables are connected.

考题 多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.