单选题A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()A spanningB address translationC mirroringD authentication

题目
单选题
A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()
A

spanning

B

address translation

C

mirroring

D

authentication


相似考题
更多“单选题A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()A spanningB address translationC mirroringD authentication”相关问题
  • 第1题:

    A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

    A. Circuit switching

    B. Network address translation

    C. Power over Ethernet

    D. Virtual servers


    参考答案:D

  • 第2题:

    A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()

    A.spanning

    B.address translation

    C.mirroring

    D.authentication


    参考答案:D

  • 第3题:

    Why would a network administrator configure port security on a switch?()

    A. To prevent unauthorized Telnet access to a switch port.

    B. To limit the number of Layer 2 broadcasts on a particular switch port.

    C. To prevent unauthorized hosts from accessing the LAN.

    D. To protect the IP and MAC address of the switch and associated ports.

    E. To block unauthorized access to the switch management interfaces over common TCP ports.


    参考答案:C

  • 第4题:

    Why would a network administrator configure port security on a switch?()

    • A、to prevent unauthorized Telnet access to a switch port
    • B、to limit the number of Layer 2 broadcasts on a particular switch port
    • C、to prevent unauthorized hosts from accessing the LAN
    • D、to protect the IP and MAC address of the switch and associated ports
    • E、to block unauthorized access to the switch management interfaces over common TCP ports

    正确答案:C

  • 第5题:

    A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()

    • A、Circuit switching
    • B、Network address translation
    • C、Power over Ethernet
    • D、Virtual servers

    正确答案:D

  • 第6题:

    Which two statements accurately describe a broadcast domain?()

    • A、Broadcast domains consist of devices that connect to a common switch or hub.
    • B、Broadcast domains consist of a group of devices that can be reached by sending a frame addressed to the Layer 2 broadcast address.
    • C、Broadcast domains require a gateway device such as a router.
    • D、Broadcast domains consist of devices that reside on the same sub-network.

    正确答案:B,D

  • 第7题:

    A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()

    • A、spanning
    • B、address translation
    • C、mirroring
    • D、authentication

    正确答案:D

  • 第8题:

    What is the purpose of a network mask?()

    • A、It is used in conjunction with the wildcard mask to determine the number of hosts on a network
    • B、It is used to define which parts of the IP address are allocated to host addresses and network prefixes
    • C、It is used to hide subnets from external networks by masking the subnets with NAT
    • D、It is used to differentiate a network as a classful network or a classless network

    正确答案:B

  • 第9题:

    单选题
    Why would a network administrator configure port security on a switch?()
    A

    to prevent unauthorized Telnet access to a switch port

    B

    to limit the number of Layer 2 broadcasts on a particular switch port

    C

    to prevent unauthorized hosts from accessing the LAN

    D

    to protect the IP and MAC address of the switch and associated ports

    E

    to block unauthorized access to the switch management interfaces over common TCP ports


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used in conjunction with the wildcard mask to determine the number of hosts on a network

    B

    It is used to define which parts of the IP address are allocated to host addresses and network prefixes

    C

    It is used to hide subnets from external networks by masking the subnets with NAT

    D

    It is used to differentiate a network as a classful network or a classless network


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Why would a network administrator configure port security on a switch?()
    A

    To prevent unauthorized Telnet access to a switch port.

    B

    To limit the number of Layer 2 broadcasts on a particular switch port.

    C

    To prevent unauthorized hosts from accessing the LAN.

    D

    To protect the IP and MAC address of the switch and associated ports.

    E

    To block unauthorized access to the switch management interfaces over common TCP ports.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
    A

    IDS

    B

    VPN

    C

    NIPS

    D

    HIDS


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

    A.transmitting devices

    B.transmitted devices

    C.receiving devices

    D.received devices


    正确答案:A

  • 第14题:

    Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.

    A.transmitting devices

    B.transmitted devices

    C.receiving devices

    D.received devices


    正确答案:A

  • 第15题:

    Why would a network administrator configure port security on a switch()。

    A.to prevent unauthorized Telnet access to a switch port

    B.to limit the number of Layer 2 broadcasts on a particular switch port

    C.to prevent unauthorized hosts from accessing the LAN

    D.to protect the IP and MAC address of the switch and associated ports

    E.to block unauthorized access to the switch management interfaces over common TCP ports


    参考答案:C

  • 第16题:

    The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()

    • A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 
    • B、BPDU guard can guarantee proper selection of the root bridge.
    • C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
    • D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
    • E、None of the other alternatives apply

    正确答案:D

  • 第17题:

    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()

    • A、Secure VPN
    • B、MAC filtering
    • C、IP filtering
    • D、Static IP addresses

    正确答案:B

  • 第18题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第19题:

    What is the primary purpose of creating a Location Group Policy? ()

    • A、to associate more than one realm with an authentication server
    • B、to logically group network access devices and associate them with specific sign-in policies
    • C、to allow or prevent users from accessing resources in specific locations on the network
    • D、to define the URL that users of network access devices can use to access the Infranet Controller

    正确答案:B

  • 第20题:

    单选题
    An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
    A

    Secure VPN

    B

    MAC filtering

    C

    IP filtering

    D

    Static IP addresses


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    What is the primary purpose of creating a Location Group Policy? ()
    A

    to associate more than one realm with an authentication server

    B

    to logically group network access devices and associate them with specific sign-in policies

    C

    to allow or prevent users from accessing resources in specific locations on the network

    D

    to define the URL that users of network access devices can use to access the Infranet Controller


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
    A

    BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. 

    B

    BPDU guard can guarantee proper selection of the root bridge.

    C

    BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.

    D

    BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.

    E

    None of the other alternatives apply


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()
    A

    spanning

    B

    address translation

    C

    mirroring

    D

    authentication


    正确答案: A
    解析: 暂无解析