多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

多选题
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
A

Configure port Fa0/1 to accept connections only from the static IP address of the server.

B

Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C

Configure the MAC address of the server as a static entry associated with port Fa0/1.

D

Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E

Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F

Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


参考解析

解析: 暂无解析

相关考题:

Your network consists of a single Active Directory domain. All computers on the network are joined to the domain.You have a server named Server1 that runs Windows Server 2003 Service Pack 2 (SP2). You install a network management application named App1 on Server1.A user named Admin1 logs on to Server1 and reports that the shortcut to App1 does not exist. You log on to Server1 as a local administrator and verify that the shortcut to App1 exists.You need to ensure that a shortcut to App1 is available for Admin1 on Server1 only.What should you do? ()A. Log on to Server1 as a local administrator. Create a shortcut to App1 in the Default User profile.B. Log on to Server1 as a local administrator. Create a shortcut to App1 in the All Users profile.C. In the Netlogon share on a domain controller, create a folder named Default User. Create a shortcut for App1 in the new folder.D. In the Netlogon share on a domain controller, create a folder named All Users. Create a shortcut for App1 in the new folder.

Your network contains a server named Server1 that runs Windows Server 2008 R2. The network contains multiple subnets.An administrator reports that Server1 fails to communicate with computers on remote subnets.You run route.exe print on Server1 as shown in the exhibit. (Click the Exhibit button.)You need to ensure that Server1 can communicate with all computers on the network.What should you do?()A. Disable IPv6.B. Change the subnet mask.C. Add a default gateway address.D. Change the default metric to 100.

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()A、Logging detect fail-loginB、Login on-failure logC、Login detect login-failure logD、Logging login on-failureE、none of the above

Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()A、 Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses.B、 Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers.C、 Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network.D、 Ensure that HTTP is always authenticated.E、 Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.

Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()A、 Verify the configuration of the connected port on the network switch.B、 Reboot the server.C、 Install a new NIC on the server.D、 Verify that network cables are connected.

You are the network administrator for All network servers run Windows Server 2003. Recently, another network administrator create a scheduled task to perform a normal backup of Microsoft Exchange Server 2003 compuer every Saturday night. You need to perform maintenance tasks on the Exchange server on this Saturday night only. If the backup starts while you are performing the maintenance tasks,data might be corrupted. You need to ensure that the backup task does not start while you perform the maintenance tasks. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.()Choose two.)A、In the Backup utility, clear the Enabled (scheduled tasks runs at specified time) check box.B、In Control Panel, use Scheduled Tasks to pause Task Scheduler.C、Run the Schtasks command with the /end /p parameters.D、Use the Services snap-in to change the startup type of the Task Scheduler service from Automatic to Manual.

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

A customer wants to increase the performance of an existing server. They are running a very network intensive application and feel that increasing the bandwidth to the network will fix their problem.  They are running two 24-port autosensing 10/100 hubs, tied together with a standard Ethernet crossover cable in port 24.  The server is running IPX. After adding a second network card and plugging one card into each hub, they have not seen any performance improvement.  Which two are likely reasons why implementing network adapter teaming has not improved performance?()A、 Adapter teaming is designed to work with switches.B、 Adapter teaming only functions with gigabit network cards.C、 Adapter teaming only provides fault tolerance, not additional bandwidth.D、 Adapter teaming only works with IPX when using switches and network cards with special features that support teaming.

An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()A、Default gatewayB、The ports on the switchC、Port security on the server's switch portD、Ethernet cable

An administrator gets a call that multiple users do not have network access to the company server that they have been using for five years. Users can access the other servers and computers in the building and check their home email accounts. The administrator tests the server’s Ethernet cable,verifies it works, and plugs it back into the NIC only to receive no status lights.  Which of the following BEST indicates the problem?()A、The DNS server is down.B、The NIC driver on the server is malfunctioning.C、The DHCP server is down.D、The server’s NIC is malfunctioning.

An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS

An AIX server is configured with a static IP address but the system administrator wants the server to give out IP addresses for clients who want to use the dynamic host configuration protocol instead of static IP addresses.How is this accomplished?()A、Use SMIT to have the server use DHCP instead of a static addressB、Edit /etc/rc.tcpip and start the dhcpsd daemonC、Use the network options command to enable ipforwardingD、Edit /etc/rc.net to set network options back to default

An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()A、Enable routed on the serverB、Enable gated on the serverC、Enable ipforwarding on the serverD、Set network options back to default

You are a network administrator for Alpine Ski House. The internal network has an Active Directory-integrated zone for the alpineskihouse.org domain. Computers on the internal network use the Active Directory-integrated DNS service for all host name resolution.   The Alpine Ski House Web site and DNS server are hosted at a local ISP. The public Web site for Alpine Ski House is accessed at www.alpineskihouse.com. The DNS server at the ISP hosts the alpineskihouse.com domain.   To improve support for the Web site, your company wants to move the Web site and DNS service from the ISP to the company’s perimeter network. The DNS server on the perimeter network must contain only the host (A) resource records for computers on the perimeter network.   You install a Windows Server 2003 computer on the perimeter network to host the DNS service for the alpineskihouse.com domain. You need to ensure that the computers on the internal network can properly resolve host names for all internal resources, all perimeter resources, and all Internet resources.   Which two actions should you take? ()A、 On the DNS server that is on the perimeter network, install a primary zone for alpineskihouse.com.B、 On the DNS server that is on the perimeter network, install a stub zone for alpineskihouse.com.C、 Configure the DNS server that is on the internal network to conditionally forward lookup requests to the DNS server that is on the perimeter network.D、 Configure the computers on the internal network to use one of the internal DNS servers as the preferred DNS server. Configure the the TCP/IP settings on the computers on the internal network to use the DNS server on the perimeter network as an alternate DNS server.E、 On the DNS server that is on the perimeter network, configure a root zone.

You are the network administrator for All network servers run Windows Server 2003. A member server named TestKingA contains two volumes. You need to perform a complete backup of the data on TestKingA. You must ensure that TestKingA can be completely restored in case of hardware failure. Which two actions should you perform? ()(Each correct answer presents part of the solution. Choose two)A、Create an Automated System Recovery (ASR) backup.B、Create a backup of user data.C、Create a Windows Server 2003 bootable floppy disk.D、Create a DOS bootable floppy disk.E、Copy all Windows Server 2003 boot files to the Windows Server 2003 bootable floppy disk.F、Copy only Boot.ini to the Windows Server 2003 bootable floppy disk

You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()A、Network AdapterB、BIOSC、ProcessorD、COM 1

单选题Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()A Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses.B Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers.C Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network.D Ensure that HTTP is always authenticated.E Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.

单选题An administrator wants to rackmount a new server.  Power and network outlets are available and cooling in the room is adequate to support the additional server. The new server is identical to the other servers already installed.  Which of the following items should the administrator FIRST verify before installing the server?()AHBA is compatible with the SAN fiber switch.BUpdate the newly installed server with the latest KVM drivers.CThe UPS will continue to perform as expected with the additional load.DVerify the server NIC is compatible with the NAS.

单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D

单选题The administrator wants to backup the existing VIO server software and its current configuration before applying an update.  What command will the administrator use to backup the VIO server software so that the backup can be restored from a Network Installation Manager (NIM) server or a Hardware Management Console (HMC)?()A mksysb -t vio /mountpointB backupios -file /mountpointC mksysb -i /mountpoint/vio.mksysbD backupios -mksysb -file /mountpoint/vio.mksysb

单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network.  In Virtual Network Manager,what should you do?()ASelect the Internal only connection type.BSelect the Private virtual machine network connection type.CSelect the Allow management operating system to share this network adapter check box.DClear the Allow management operating system to share this network adapter check box.

单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

单选题A network administrator wants to detect a login attack against a router. What IOS command can make the attack recorded in syslog server?()ALogging detect fail-loginBLogin on-failure logCLogin detect login-failure logDLogging login on-failureEnone of the above

多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

单选题You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()ADisable port 80 on the SUSAdmin Web site.BRequire 128-Bit SSL on all directories related to the SUSAdmin Web site.CChange the default Web site to require 128-Bit SSL.DEnable IPSec on Testking2 with the Request Security IPsec template.

单选题You are an enterprise administrator for Cer-tech .com. The company runs Windows Server 2008 on all theservers on the network. Two servers on the network were configured as follows: Server01:Windows Media Services server role installed Server02:Windows Media Services server role installed and is also configured a License Clearing House.You published an audio file,which is licensed by Server02 on Server01. Which of the following optionswould you choose to ensure that users are allowed to use the audio file for only two days?()AModify the license on Server02.BModify the key ID on Server01.CCreate a new package on Server02.DModify the license key seed on Server01.