多选题After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()AIf a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.BEnable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.CConfigure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.DSet the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.EDisable all unused ports and place them in an unused VLAN to avoid unauthorized access.
多选题
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
A
If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.
B
Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.
C
Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.
D
Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.
E
Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.
参考解析
解析:
暂无解析
相关考题:
What are some of the characteristics of a typical VLAN arrangement, found throughout the Ezonexam switched LAN? (Select all that apply)A. VLANs logically divide a switch into multiple, independent switches at Layer 2.B. Trunk links can carry traffic for multiple VLANs.C. VLAN implementation significantly increases traffic due to added trunking information.D. A VLAN can span multiple switches.E. VLANs typically increase the number of switches neededF. VLANs typically decrease the number of switches needed
Which two link protocols are used to carry multiple VLANs over a single link?() A.VTPB.802.1qC.IGPD.ISLE.802.3u
What are some characteristics of the typical VLAN arrangement?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、A VLAN can span multiple switches.E、VLANs extend the collision domain to include multiple switches.F、VLANs typically decrease the number of multiple switches.
A hacker on the Company network is attempting to hop onto a different VLAN. Which two statements about VLAN hopping are true? ()A、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.B、 Configuring an interface with the "switchport mode dynamic" command will prevent VLAN hopping.C、 Attacks are prevented by utilizing the port-security feature.D、 Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.E、 An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.
Which three statements are typical characteristics of VLAN arrangements?()A、A new switch has no VLANs configured.B、Connectivity between VLANs requires a Layer 3 device.C、VLANs typically decrease the number of collision domains.D、Each VLAN uses a separate address space.E、A switch maintains a separate bridging table for each VLAN.F、VLANs cannot span multiple switches.
What are some of the characteristics of a typical VLAN arrangement?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、A VLAN can span multiple switches.E、VLANs typically increase the number of switches neededF、VLANs typically decrease the number of switches needed
You are planning a new VLAN-based network solution. What is one item you should consider when creating your implementation plan as it concerns VLANs?()A、generic router and switch configuration parametersB、end-to-end test plan after all components have been installed and configuredC、administrator assignmentsD、rollback plan
The Company security administrator wants to prevent VLAN hopping on the network. What is one method that can be used to do this? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN hopping.
Which of the following can be an expected outcome of a VLAN?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、VLANs can span multiple switches.E、VLANs typically decrease the number of switches needed
Which two link protocols are used to carry multiple VLANs over a single link?()A、VTPB、802.1qC、IGPD、ISLE、802.3u
In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()A、The names of the VLANs used by the SmartPorts are case insensitiveB、The ports may belong to a configurable data VLANC、The names of the VLANs used by the Smartports are not relevantD、The ports may belong to many VLANs, depending on how many PCs are connected to each port.E、The names of the VLANs used by the Smartports are case sensitive
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.
Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?()A、Eighty percent of traffic on the network is destined for Internet sites.B、There are common sets of traffic filtering requirements for workgroups located in multiple buildings.C、Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.D、Users are grouped into VLANs independent of physical location.E、None of the other alternatives apply
An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()A、 The servers firewall is misconfigured.B、 The server’s timeout feature is set incorrectly.C、 The web server was not installed properly.D、 The company firewall is misconfigured.
Which of the following should an administrator utilize FIRST after installing a new HBA?()A、 New Technology File Systems (NTFS)B、 Digitally signed device driversC、 Virtual machine componentsD、 Multiple RAID configurations
An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed. Which of the following is the MOST likely cause?()A、 Corrupt file system tableB、 Backplane failureC、 Multiple drive failureD、 Bad cable
Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()A、Very HighB、HighC、ModerateD、LowE、Very Low
单选题Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()AVery HighBHighCModerateDLowEVery Low
单选题When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()A802.1q trunkingBVTP trunkingCISL trunkingDDPT trunking
单选题An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed. Which of the following is the MOST likely cause?()A Corrupt file system tableB Backplane failureC Multiple drive failureD Bad cable
单选题Which of the following should an administrator utilize FIRST after installing a new HBA?()A New Technology File Systems (NTFS)B Digitally signed device driversC Virtual machine componentsD Multiple RAID configurations
单选题When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()A802.1q trunkingBvtp trunkingCisl trunkingDdpt trunking
单选题An administrator has just installed a web server for the company's Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()AThe server's firewall is misconfigured.BThe server's timeout feature is set incorrectly.CThe web server was not installed properly.DThe company firewall is misconfigured.
单选题Which statement is most correct regarding vNICs and VLANs?()Aonly the default vlan has traffic that is taggedBAll vNICs have to be associated with one or more VLANs except for the default vlanCvlan must be configured before configuring them into a vNICDTagging is done by the operating system NIC if the flag is set to tag traffic
多选题In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()AThe names of the VLANs used by the SmartPorts are case insensitiveBThe ports may belong to a configurable data VLANCThe names of the VLANs used by the Smartports are not relevantDThe ports may belong to many VLANs, depending on how many PCs are connected to each port.EThe names of the VLANs used by the Smartports are case sensitive
多选题A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)AUse the custom application feature.BConfigure static NAT for the host.CUse port address translation (PAT).DUse the address-persistent option.
问答题Which spanning tree mode will allow you to put multiple vlans into one instance?