A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
第1题:
A.The network administrator can apply port security to dynamic access ports
B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.The network administrator can apply port security to EtherChannels.
E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第2题:
Why would a network administrator configure port security on a switch?()
第3题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第4题:
When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()
第5题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第6题:
A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()
第7题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht use a wireless connection to access the network. What should you do?()
第8题:
You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals: • Enable users in both departments to access their own files from the network • Enable users in the Accounting department to view the Legal department’s documents • Prevent users in the Legal department from being able to view the Accounting department’s documents • Enable managers within the company to access and modify both the Accounting and the Legal department’s files You take the following actions: • Create two shared folders named Accounting and Legal • Create three groups named Accounting, Legal, and Management • Allow the Accounting group Modify permission on the Accounting folder • Allow the Accounting group Read permissions on the Legal folders. • Allow the Management group Modify permission on both the Accounting and Legal folders. Which result or results do these actions produce?()
第9题:
Configure all access points to use 802.1X authentication
Configure all protable computers to use MS-CHAP v2 authentication
Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.
Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.
第10题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第11题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第12题:
Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.
Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.
第13题:
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
第14题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第15题:
The network administrator wants to enable an EtherChannel between two switches in "on" mode. The administrator connects the cables and enables the interfaces, but while configuring the EtherChannel in the first switch,a spanning-tree loop was detected. Which two of these procedures can avoid this problem?()
第16题:
You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication. What supported authentication server should be chosen?()
第17题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第18题:
You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
第19题:
Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第20题:
Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()
第21题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第22题:
Users in both departments can access to their own files from the network.
Users in the Accounting department can view the Legal department’s documents.
Users in the Legal department cannot view the Accounting department’s documents.
Company managers can access and modify both departments’ files.
第23题:
Configure roles based on departments and assign access based on source IP address.
Configure roles based on the user's manager and assign access based on the user's MAC address
Configure roles based on group memberships and assign a specific VLAN to the role.
Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.