单选题Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()AIPSec VPNBSSL VPNCport securityDport security with statically configured MAC addressesEprivate VLANs

单选题
Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()
A

IPSec VPN

B

SSL VPN

C

port security

D

port security with statically configured MAC addresses

E

private VLANs


参考解析

解析: 暂无解析

相关考题:

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()A.NATB.DynamicC.SubnettingD.Static

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()A、port-based radiusB、802.1q trunkingC、inline powerD、protected port

Which VPN management feature would be considered to ensure that the network had the leastdisruption of service when making topology changes?()A、 dynamic reconfigurationB、 path MTU discoveryC、 auto setupD、 remote management

An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)A、The WAN link is down.B、IPSec is enabled on the WX.C、Traceroute is enabled for compression.D、The network is configured using static routes.E、The local and remote cables are accidentally swapped.

Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()A、dynamic reconfigurationB、path MTU discoveryC、auto setupD、remote management

As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()A、GLBPB、RSTPC、BPDU guardD、root guard

Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs

Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()A、policy routingB、increase link capacityC、WREDD、CBWFQE、LFIF、WFQ

Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?()A、Event ViewerB、System File CheckerC、MSCONFIGD、Task Manager

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP

Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()A、Baseline configurationB、Security policyC、Performance and transaction logsD、Physical network diagram

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

What is the primary purpose of creating a Location Group Policy? ()A、to associate more than one realm with an authentication serverB、to logically group network access devices and associate them with specific sign-in policiesC、to allow or prevent users from accessing resources in specific locations on the networkD、to define the URL that users of network access devices can use to access the Infranet Controller

Your network contains an Exchange Server 2010 server.You need to prevent e-mail messages that contain specific words from being sent between users in the organization. What should you do?()A、Create a transport rule.B、Create an Outlook Protection Rule.C、Configure the content filtering feature.D、Configure the sender reputation feature.

多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

单选题An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()AMultilayer switchBCSUCProxy serverDIDS

单选题Which of the following would be the way to prevent the Num Lock LED from being turned on automatically when a laptop is booted? ()AHold the function Num Lock key down during POST.BGo into the Windows Keyboard applet and deselect the ’Num Lock on boot’ option.CCreate a Windows profile to disable the feature during power-on self test (POST).DTurn the feature off in the BIOS.

单选题Which of the following should a technician do FIRST to troubleshoot a users network connectivity problem?()ARun TRACERT from the users workstation.BStart with the Last Known Good Configuration and reboot the computer.CReplace the network interface card (NIC).DPING the users workstation.

单选题Two access points running the core feature set are connected to the same switch and are  providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()Aport-based radiusB802.1q trunkingCinline powerDprotected port

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()ADisable SSIDBWPACMAC filteringDRAS

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题Which feature would prevent guest users from gaining network access by unplugging an IP phone andconnecting a laptop computer?()AIPSec VPNBSSL VPNCport securityDport security with statically configured MAC addressesEprivate VLANs

多选题Which three circumstances would prevent traceroute from displaying the WAN IP addresses? ()(Choose three)AThe WAN link is down.BIPSec is enabled on the WX.CTraceroute is enabled for compression.DThe network is configured using static routes.EThe local and remote cables are accidentally swapped.

多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

单选题An administrator is setting up a network and would like to prevent users from having the ability to plug their PC into the network to receive an IP address. Which of the following addressing schemes should the technician use?()ANATBDynamicCSubnettingDStatic