网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()
A
IPSec VPN
B
SSL VPN
C
port security
D
port security with statically configured MAC addresses
E
private VLANs
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()A IPSec VPNB SSL VPNC port securityD port security with statically configured MAC addressesE private VLANs” 相关考题
考题
An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
A.IDSB.VPNC.NIPSD.HIDS
考题
Two access points running the core feature set are connected to the same switch and are providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A、port-based radiusB、802.1q trunkingC、inline powerD、protected port
考题
Which VPN management feature would be considered to ensure that the network had the leastdisruption of service when making topology changes?()A、 dynamic reconfigurationB、 path MTU discoveryC、 auto setupD、 remote management
考题
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses
考题
Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)A、The WAN link is down.B、IPSec is enabled on the WX.C、Traceroute is enabled for compression.D、The network is configured using static routes.E、The local and remote cables are accidentally swapped.
考题
Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()A、dynamic reconfigurationB、path MTU discoveryC、auto setupD、remote management
考题
As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard
考题
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs
考题
Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ
考题
Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager
考题
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS
考题
Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP
考题
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram
考题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
考题
What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller
考题
Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.
考题
多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ
考题
单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()A
Multilayer switchB
CSUC
Proxy serverD
IDS
考题
单选题Which of the following would be the way to prevent the Num Lock LED from being turned on automatically when a laptop is booted? ()A
Hold the function Num Lock key down during POST.B
Go into the Windows Keyboard applet and deselect the ’Num Lock on boot’ option.C
Create a Windows profile to disable the feature during power-on self test (POST).D
Turn the feature off in the BIOS.
考题
单选题Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()A
Run TRACERT from the users workstation.B
Start with the Last Known Good Configuration and reboot the computer.C
Replace the network interface card (NIC).D
PING the users workstation.
考题
单选题Two access points running the core feature set are connected to the same switch and are providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A
port-based radiusB
802.1q trunkingC
inline powerD
protected port
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A
BPDUB
Port securityC
RSTPD
STPE
VTPF
Blocking mode
考题
多选题Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)AThe WAN link is down.BIPSec is enabled on the WX.CTraceroute is enabled for compression.DThe network is configured using static routes.EThe local and remote cables are accidentally swapped.
考题
多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ
考题
单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()A
NATB
DynamicC
SubnettingD
Static
热门标签
最新试卷