单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。A IPB ICMPC TCPD UDP

题目
单选题
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A

IP

B

ICMP

C

TCP

D

UDP


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“For security reasons, the network administrator needs to pre”相关问题
  • 第1题:

    A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

    A.

    B.

    C.

    D.


    参考答案:B

  • 第2题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第3题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Storage-area network (SAN)
    • C、Content delivery network (CDN)
    • D、Network management

    正确答案:D

  • 第4题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第5题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Network management
    • C、Storage-area network (SAN)
    • D、Content delivery network (CDN)

    正确答案:B

  • 第6题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()

    • A、 Default gateway
    • B、 The ports on the switch
    • C、 Port security on the servers switch port
    • D、 Ethernet cable

    正确答案:A

  • 第7题:

    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

    • A、 PAT
    • B、 ACLs
    • C、 Subnet masking
    • D、 Port blocking

    正确答案:B

  • 第8题:

    单选题
    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()
    A

     PAT

    B

     ACLs

    C

     Subnet masking

    D

     Port blocking


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()
    A

    /etc/security/limits

    B

    /etc/security/mkuser.sys

    C

    /etc/security/priv

    D

    /etc/security/user


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    多选题
    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
    A

    the desire to avoid unnecessary technologies

    B

    the belief that free security tools are sufficient

    C

    the perceived costs of security solutions

    D

    the use of hosted email services eliminating the need for local security

    E

    the lack of threats to their network

    F

    the lack of risk analysis


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    单选题
    Which network technology addresses these customer business needs: shrinking budgets and ITstaffs, more complex networks, and an increased need for network security?()
    A

    Optical network

    B

    Storage-area network (SAN)

    C

    Content delivery network (CDN)

    D

    Network management


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A user complains that the network printer is not printing.  The system administrator knows there is a print queue for the network printer and needs to check on the queue.  Which command is run?()

    • A、 netstat 
    • B、 lpstat 
    • C、 telinit 
    • D、 prtconf 

    正确答案:B

  • 第14题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第15题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第16题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第17题:

    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

    • A、the use of hosted email services eliminating the need for local security
    • B、the perceived costs of security solutions
    • C、the lack of risk analysis
    • D、the lack of threats to their network
    • E、the belief that free security tools are sufficient
    • F、the desire to avoid unnecessary technologies

    正确答案:B,C

  • 第18题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()

    • A、Default gateway
    • B、The ports on the switch
    • C、Port security on the server's switch port
    • D、Ethernet cable

    正确答案:A

  • 第19题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第20题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
    A

    Default gateway

    B

    The ports on the switch

    C

    Port security on the server's switch port

    D

    Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()
    A

    The host needs to open the telnet port.

    B

    The host needs a route for the translated address.

    C

    The administrator must use a proxy-arp policy for the translated address.

    D

    The administrator must use a security policy, which will allow communication between the zones.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    An administrator needs to authenticate users to the network, authorize network activities, and account for activities done. Which of the following are services that will BEST meet these goals?()(Select TWO).
    A

    TACACS+

    B

    RADIUS

    C

    Kerberos

    D

    802.1X

    E

    RRAS


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    单选题
    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()
    A

    Optical network

    B

    Network management

    C

    Storage-area network (SAN)

    D

    Content delivery network (CDN)


    正确答案: D
    解析: 暂无解析