A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()

  • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.
  • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.
  • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.
  • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

相关考题:

文中( 2 )处正确的答案是( )。A.network stationsB.network clientsC.network devicesD.network seI'vers

文中( 4 )处正确的答案是( )。A.network growthB.network structureC.network architectureD.network servers

●The Simple Network Management Protocol (SNMP)is an (71) protocol that facilitates the exchange of management information between (72) .It is part of the Transmission Control Protocol/Internet Protocol(TCP/IP) protocol suite.SNMP enables network (73) to manage network performance, find and sole network problems,and plan for (74) .An SNMP-managed network consists of three key components:managed devices , (75) ,and network-management systems .(71) A.Physical LayerB.Link LayerC.Network LayerD.Transport Layer(72) A.network stationsB.network clientsC.network devicesD.network servers(73) A.serversB.administratorsC.computersD.routers(74) A.network growthB.network structureC.network architectureD.network servers(75) A.administratorsB.agentsC.managersD.servers

WhichofthefollowingClassAnetworksisreservedfor"privatenetworks"useonly?() A.network10.0.0.0B.network127.0.0.0C.network129.135.0.0D.network192.168.0.0

Refer to the exhibit. The routing protocols EIGRP and OSPF have been configured as indicated in the exhibit. Given the partial configuration of router R2, which network will be present in th e routing table of R4?()A. Network BB. Network A and Network BC. Network AD. neither Network A nor Network B

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? () A. 64 network and 4 hostsB. 4 network and 64 hostsC. 2 network and 62 hostsD. 62 network and 2 hosts

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was originated via a network or aggregate commandD、The network was learned via EBGPE、The network was learned via IBGP

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was learned via IBGPD、The network was learned via EBGPE、The network was originated via a network or aggregate command

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()A、The network was originated via redistribution of an interior gateway protocol into BGP.B、The network was defined by a static route.C、The network was learned via IBGP.D、The network was learned via EBGP.E、The network was originated via a network or aggregate command.

How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A、64 network and 4 hostsB、4 network and 64 hostsC、2 network and 62 hostsD、62 network and 2 hosts

Your computer has a wireless network adapter installed. However, the computer fails to connect to the wireless network.  You need to ensure that the computer is able to connect to the wireless network.  What should you do?()A、Change the Network Category setting of the wireless connection to Public.B、Enable the Internet Connection Sharing feature on the wireless network adapter.C、Rename the wireless network adapter to match the Service Set Identifier (SSID) of the wireless network.D、Configure the wireless network adapter to connect to the appropriate wireless network from the Connect to a network list.

Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0

You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

What does a router do?()A、Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN)B、Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN)C、Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN)D、Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)

Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Storage-area network (SAN)C、Content delivery network (CDN)D、Network management

How does network integration help businesses keep pace with changing network demands?()A、 addition of strict firewallsB、 limiting Internet accessC、 intelligence on foundation network devicesD、 increased use of network services

Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Network managementC、Storage-area network (SAN)D、Content delivery network (CDN)

A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()A、The network uses MAC filteringB、The network uses WEPC、The network uses SSID broadcastD、The network uses WPA

Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()A、Configure the Network authentication (Shared mode) setting.B、Apply a Wireless Network Policy to set the network type to WPA-PSK.C、Apply a Wireless Network Policy to automatically connect to the company wireless network.D、Apply a Wireless Network Policy to set the company wireless network as the preferred network.

设定某地某系列的NOTAM既进入国际及国内PIB,应进入INMS系统的哪个界面进行操作()。A、System Data中的Subscriber ListB、Static Data中的AerodromeC、System Data中的Domestic OrganizationsD、TNMS Administra

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was originated via a network or aggregate commandDThe network was learned via EBGPEThe network was learned via IBGP

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The domain contains Windows Server 2003 computers and Windows XP Professional computers.  You configure a server named Server1 to be a file server. The written company security policy states that you must analyze network traffic that is sent to and from all file servers.You need to capture file-transfer network traffic that is being sent to and from Server1. You install Network Monitor Tools from a Windows Server 2003 product CD-ROM on a server named Server2, which is on the same network segment as Server1.You run Network Monitor on Server2. However, Network Monitor captures only network traffic that is sent to and from Server2. You need to capture all network traffic that is sent to and from Server1.  What should you do?()AInstall the Network Monitor driver on Server1. Run Network Monitor on Server2 to capture network traffic.BOpen Network Monitor on Server2 and create a capture filter to enable the capture of all protocols. Run Network Monitor to capture network traffic.CInstall Network Monitor Tools on Server1. Run Network Monitor to capture network traffic.DOpen Network Monitor on Server2 and increase the capture buffer from 1 MB to 20 MB in size. Run Network Monitor to capture network traffic.

单选题A technician installed a new wireless access point on an existing small office home office (SOHO) network with a selective security option enabled. All wireless computers connect to the new network except one computer that cannot connect to the wireless network. Which of the following is the cause?()AThe network uses MAC filteringBThe network uses WEPCThe network uses SSID broadcastDThe network uses WPA

单选题How many usable sub network and usable hosts per subnet result in the network address 201.105.13.0 is sub netted with a mask of /26? ()A64 network and 4 hostsB4 network and 64 hostsC2 network and 62 hostsD62 network and 2 hosts

单选题Which option describes the default roles available to RBAC on Cisco Nexus switches?()A admin, operator, network-admin, and network-operatorB admin, read-only, network-admin, and network-operatorC vdc-admin, vdc-operator, network-admin, and network-operatorD vdc-admin, vdc-operator, network-admin, and network-operator (for Nexus 7000) and network- admin and network-operator (for other Nexus switches)E admin and read-only

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when using the "show ip bgp" c ommand?()AThe network was originated via redistribution of an interior gateway protocol into BGP.BThe network was defined by a static route.CThe network was learned via IBGP.DThe network was learned via EBGP.EThe network was originated via a network or aggregate command.

多选题What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()AThe network was originated via redistribution of an interior gateway protocol into BGPBThe network was defined by a static routeCThe network was learned via IBGPDThe network was learned via EBGPEThe network was originated via a network or aggregate command