多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address, subnet mask, and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch
多选题
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
A
The switch must be configured with an IP address, subnet mask, and default gateway.
B
The switch must be connected to a router over a VLAN trunk.
C
The switch must be reachable through a port connected to its management VLAN.
D
The switch console port must be connected to the Ethernet LAN.
E
The switch management VLAN must be created and have a membership of at least one switch
参考解析
解析:
暂无解析
相关考题:
The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above
You would like to configure an Ethernet interface with the following characteristics:Which set of configuration commands accurately completes this task?() A.AB.BC.CD.D
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?() A. ARP spoofingB. VLANC. MirroringD. Spanning tree
The Ezonexam network administrator needs to a switch named VE1 to become the root bridge for a redundant path switched network. What can be done to ensure that VE1 will always assume the role as the root bridge?A.Assign the switch a higher MAC address than the other switches in the network haveB.Establish a direct link from the switch to all other switches in the networkC.Configure the switch full-duplex operation and configure the other switches for half-duplex operationD.Configure the switch so that it has lower priority than other switches in the networkE.None of the above
Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports
Assuming the default switch configuration,which approach should you use to configure the extended vlan range(1006 through 4094) on a cisco catalyst 3750 series switch?()A、Configure the switch to be in VTP client mode.B、Configure the switch to be in VTP domaint mode.C、Configure the switch to be in VTP transparent mode.D、Configure the switch to be in VTPv2.
Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.
Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A、Configure roles based on departments and assign access based on source IP address.B、Configure roles based on the user's manager and assign access based on the user's MAC addressC、Configure roles based on group memberships and assign a specific VLAN to the role.D、Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address,subnet mask,and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch port.F、The switch must be fully configured as an SNMP agent.
A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A、Establish a direct link from the switch to all other switches in the network.B、Assign the switch a higher MAC address than the other switches in the network have.C、Configure the switch so that it has a lower priority than other switches in the network.D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.
An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address, subnet mask, and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices.What would be the most efficient way to configure MAC-level security on all these ports? ()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security
Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()A、 VPNB、 KVM over IPC、 TelnetD、 Remote Desktop
Which of the following features should an administrator configure to allow an IDS to watch thetraffic on a switch?()A、ARP spoofingB、VLANC、MirroringD、Spanning tree
On which of the following network devices would an administrator configure an ACL?()A、RouterB、HubC、RepeaterD、NIC
A system administrator would like to verify the user definitions in the /etc/passwd file. Which of the following commands will accomplish this?()A、usrckB、sysckC、lssecD、lsuser
Which of the following would be true if an administrator tried to create a commerce instance with Commerce Payments configuration values, without having Commerce Payments installed?()A、The commerce instance would be created successfully.B、Attempting to configure payments instance after the commerce instance is already created will not be possible.C、The commerce instance creation will fail on the step that would normally configure the payments instance.D、After installing Commerce Payments, the administrator can enter the needed payment configuration values through the Administration Console.
单选题Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()A VPNB KVM over IPC TelnetD Remote Desktop
单选题An administrator is beginning a set of failover tests. The administrator would like to have clean log files foreach test. Which command will achieve this?()AclcycleBclrefreshCcllogcycleDcllogrotate
单选题Why would a network administrator configure port security on a switch()。Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports
多选题An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()AThe switch must be configured with an IP address,subnet mask,and default gateway.BThe switch must be connected to a router over a VLAN trunk.CThe switch must be reachable through a port connected to its management VLAN.DThe switch console port must be connected to the Ethernet LAN.EThe switch management VLAN must be created and have a membership of at least one switch port.FThe switch must be fully configured as an SNMP agent.
单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.