spanning
address translation
mirroring
authentication
第1题:
A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()
A. Circuit switching
B. Network address translation
C. Power over Ethernet
D. Virtual servers
第2题:
A.spanning
B.address translation
C.mirroring
D.authentication
第3题:
A. To prevent unauthorized Telnet access to a switch port.
B. To limit the number of Layer 2 broadcasts on a particular switch port.
C. To prevent unauthorized hosts from accessing the LAN.
D. To protect the IP and MAC address of the switch and associated ports.
E. To block unauthorized access to the switch management interfaces over common TCP ports.
第4题:
Why would a network administrator configure port security on a switch?()
第5题:
A network technician is concerned about the environmental effects of power consumption and heat from network resources Limited space is also a concern. Which of the following technologies should be implemented?()
第6题:
Which two statements accurately describe a broadcast domain?()
第7题:
A common technique used to prevent the unauthorized network devices from sending trafficacross a network is port()
第8题:
What is the purpose of a network mask?()
第9题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第10题:
It is used in conjunction with the wildcard mask to determine the number of hosts on a network
It is used to define which parts of the IP address are allocated to host addresses and network prefixes
It is used to hide subnets from external networks by masking the subnets with NAT
It is used to differentiate a network as a classful network or a classless network
第11题:
To prevent unauthorized Telnet access to a switch port.
To limit the number of Layer 2 broadcasts on a particular switch port.
To prevent unauthorized hosts from accessing the LAN.
To protect the IP and MAC address of the switch and associated ports.
To block unauthorized access to the switch management interfaces over common TCP ports.
第12题:
IDS
VPN
NIPS
HIDS
第13题:
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第14题:
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
A.transmitting devices
B.transmitted devices
C.receiving devices
D.received devices
第15题:
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
第16题:
The network administrator has enabled BPDU guard on the LAN. Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()
第17题:
An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()
第18题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第19题:
What is the primary purpose of creating a Location Group Policy? ()
第20题:
Secure VPN
MAC filtering
IP filtering
Static IP addresses
第21题:
to associate more than one realm with an authentication server
to logically group network access devices and associate them with specific sign-in policies
to allow or prevent users from accessing resources in specific locations on the network
to define the URL that users of network access devices can use to access the Infranet Controller
第22题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第23题:
BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network.
BPDU guard can guarantee proper selection of the root bridge.
BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.
BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.
None of the other alternatives apply
第24题:
spanning
address translation
mirroring
authentication