网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A
BPDU
B
Port security
C
RSTP
D
STP
E
VTP
F
Blocking mode
参考答案
参考解析
解析:
暂无解析
更多 “单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A BPDUB Port securityC RSTPD STPE VTPF Blocking mode” 相关考题
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections.Which of the following MUST be deployed?()
A.IDSB.IPSC.FirewallD.Managed PKI
考题
An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()A. Disable SSIDB. WPAC. MAC filteringD. RAS
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
A.netstatB.tracerouteC.nbtstatD.ping
考题
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
A. reflexiveB. extendedC. standardD. dynamic
考题
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A.IPB.ICMPC.TCPD.UDP
考题
Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A、 VLANB、 KVMC、 IP KVMD、 RAID
考题
An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A、 QuotasB、 SNMPC、 Disk managementD、 ACL
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic
考题
Which is not a reason that Internet Service Providers prefer to use PPP over Ethernet (PPoE)?()A、access control and billing can be done on a per-user, rather than a per-site basisB、supports Link Fragmentation and Interleaving C、provides the ability to connect a network of hosts over a simple bridging access deviceD、provides a consistent means of authenticating users (RADIUS for example)
考题
A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A、 That there are no DHCP relay serversB、 That the user account on Active Directory is not lockedC、 That the network card driver is not installed incorrectlyD、 The network connection is functioning
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping
考题
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()A、IDSB、IPSC、FirewallD、Managed PKI
考题
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
考题
A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A、 Guest user accountB、 Limited user accountC、 Power user accountD、 Administrator user account
考题
You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporary restore the user data to DC2. Which type of restoration should you perform?()A、Automated System Recovery (ASR)B、NormalC、PrimaryD、Authoritative
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. All network servers run Windows Server 2003. The domain contains three domain controllers: DC1, DC2, and DC3. Each one hosts user data. DC1 experiences hard disk failure. You need to temporarily restore the user data to DC2. Which type of restoration should you perform? ()A
Automated System Recovery (ASR)B
normalC
primaryD
authoritative
考题
单选题A technician deploys a computer in a public library and wants to give the ability for a user without an account to use the computer with limited permission. Which of the following accounts would the technician setup?()A
Guest user accountB
Limited user accountC
Power user accountD
Administrator user account
考题
单选题A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()A
That there are no DHCP relay serversB
That the user account on Active Directory is not lockedC
That the network card driver is not installed incorrectlyD
The network connection is functioning
考题
单选题Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()A
VLANB
KVMC
IP KVMD
RAID
考题
单选题A user can ping everything on the local network earth.net from an AIX box (which is located on earth.net). However, if the user tries to ping something on another network (mars.net) the user must type the fully qualified hostname. What can the user do so that the fully qualified hostname does not have to be typed every time the user wants to access ANY machine on mars.net?()A
Edit the /etc/hosts file and add an alias to the correct entryB
Set up an alias in his .kshrc file to alias the hostname to the fully qualified hostnameC
Add an alias to /etc/aliasesD
Add mars.net to the search path of the resolv.conf file
考题
单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A
Disable SSIDB
WPAC
MAC filteringD
RAS
考题
多选题You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()ACreate a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.BConfigure a wired adapter and assign the required SSID under User Roles Agent Odyssey Settings.CCreate a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.DCreate a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles Agent Odyssey Settings Preconfigured Installer.
考题
单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A
IPB
ICMPC
TCPD
UDP
考题
单选题You are the network administrator at TestKing. TestKing has been provided withthe network address 165.100.27.0/24. The TestKing CEO wants to know how many subnetworks this address provides, and how many hosts can be supported on each subnet. What would your reply be?()A
One network with 254 hosts.B
254 networks with 254 hosts per network.C
65,534 networks with 255 hosts per network.D
30 networks with 64 hosts per network.E
254 networks with 65,534 per network.
考题
单选题An administrator wants to limit how much data each user is storing. Which of the following will BEST address this issue?()A
QuotasB
SNMPC
Disk managementD
ACL
热门标签
最新试卷