多选题After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()AIf a port is connected to a foreign device make sure to disable CDP, DTP, R

题目
多选题
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
A

If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.

B

Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.

C

Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.

D

Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.

E

Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.


相似考题
更多“After properly configuring multiple VLANs, an administrator ”相关问题
  • 第1题:

    A hacker on the Company network is attempting to hop onto a different VLAN.  Which two  statements about VLAN hopping are true? ()

    • A、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
    • B、 Configuring an interface with the "switchport mode dynamic" command will prevent VLAN  hopping.
    • C、 Attacks are prevented by utilizing the port-security feature.
    • D、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.
    • E、 An end station attempts to redirect VLAN traffic by broadcasting multiple ARP requests.

    正确答案:A,D

  • 第2题:

    What are some of the characteristics of a typical VLAN arrangement?()

    • A、VLANs logically divide a switch into multiple, independent switches at Layer 2.
    • B、Trunk links can carry traffic for multiple VLANs.
    • C、VLAN implementation significantly increases traffic due to added trunking information.
    • D、A VLAN can span multiple switches.
    • E、VLANs typically increase the number of switches needed
    • F、VLANs typically decrease the number of switches needed

    正确答案:A,B,D

  • 第3题:

    The Company security administrator wants to prevent VLAN hopping on the network.  What is one  method that can be used to do this?  ()

    • A、 Attacks are prevented by utilizing the port-security feature.
    • B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.
    • C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.
    • D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.
    • E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

    正确答案:B,E

  • 第4题:

    Which two link protocols are used to carry multiple VLANs over a single link?()

    • A、VTP
    • B、802.1q
    • C、IGP
    • D、ISL
    • E、802.3u

    正确答案:B,D

  • 第5题:

    After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()

    • A、 If a port is connected to a foreign device make sure to disable CDP, DTP, RPR, PAgP, UDLP, and any other unnecessary protocols, and enable UplinkFast/BPDU guard on it.
    • B、 Enable root guard feature to prevent a directly or indirectly connected STP-capable device from affecting the location of the root bridge.
    • C、 Configure VTP domains appropriately or turn off VTP altogether to limit or prevent possible undesirable protocol interaction with regards to the network-wide VLAN configuration.
    • D、 Set the native VLAN ID to match the port VLAN ID of any 802.1q trunk to prevent spoofing.
    • E、 Disable all unused ports and place them in an unused VLAN to avoid unauthorized access.

    正确答案:B,C,E

  • 第6题:

    An administrator has just installed a web server for the companys Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues.  Which of the following is the MOST likely reason for this?()

    • A、 The servers firewall is misconfigured.
    • B、 The server’s timeout feature is set incorrectly.
    • C、 The web server was not installed properly.
    • D、 The company firewall is misconfigured.

    正确答案:D

  • 第7题:

    An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed.  Which of the following is the MOST likely cause?()

    • A、 Corrupt file system table
    • B、 Backplane failure
    • C、 Multiple drive failure
    • D、 Bad cable

    正确答案:B

  • 第8题:

    单选题
    Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()
    A

    Very High

    B

    High

    C

    Moderate

    D

    Low

    E

    Very Low


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    An administrator reboots a ten drive server, with a RAID 10 array, after a power failure and receives an error logical drive failed.  Which of the following is the MOST likely cause?()
    A

     Corrupt file system table

    B

     Backplane failure

    C

     Multiple drive failure

    D

     Bad cable


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    When configuring vlans on an autonomous access point. What must be configured on the connected switchport?()
    A

    802.1q trunking

    B

    vtp trunking

    C

    isl trunking

    D

    dpt trunking


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is most correct regarding vNICs and VLANs?()
    A

    only the default vlan has traffic that is tagged

    B

    All vNICs have to be associated with one or more VLANs except for the default vlan

    C

    vlan must be configured before configuring them into a vNIC

    D

    Tagging is done by the operating system NIC if the flag is set to tag traffic


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)
    A

    Use the custom application feature.

    B

    Configure static NAT for the host.

    C

    Use port address translation (PAT).

    D

    Use the address-persistent option.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    Which three statements are typical characteristics of VLAN arrangements?()

    • A、A new switch has no VLANs configured.
    • B、Connectivity between VLANs requires a Layer 3 device.
    • C、VLANs typically decrease the number of collision domains.
    • D、Each VLAN uses a separate address space.
    • E、A switch maintains a separate bridging table for each VLAN.
    • F、VLANs cannot span multiple switches.

    正确答案:B,D,E

  • 第14题:

    You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()

    • A、generic router and switch configuration parameters
    • B、end-to-end test plan after all components have been installed and  configured
    • C、administrator assignments
    • D、rollback plan

    正确答案:D

  • 第15题:

    Which of the following can be an expected outcome of a VLAN?()

    • A、VLANs logically divide a switch into multiple, independent switches at Layer 2.
    • B、Trunk links can carry traffic for multiple VLANs.
    • C、VLAN implementation significantly increases traffic due to added trunking information.
    • D、VLANs can span multiple switches.
    • E、VLANs typically decrease the number of switches needed

    正确答案:A,B,D

  • 第16题:

    In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

    • A、The names of the VLANs used by the SmartPorts are case insensitive
    • B、The ports may belong to a configurable data VLAN
    • C、The names of the VLANs used by the Smartports are not relevant
    • D、The ports may belong to many VLANs, depending on how many PCs are connected to each port.
    • E、The names of the VLANs used by the Smartports are case sensitive

    正确答案:B,E

  • 第17题:

    Under what circumstances should an administrator prefer local VLANs over end-to-end VLANs?()

    • A、Eighty percent of traffic on the network is destined for Internet sites.
    • B、There are common sets of traffic filtering requirements for workgroups located in multiple  buildings.
    • C、Eighty percent of a workgroup’s traffic is to the workgroup’s own local server.
    • D、Users are grouped into VLANs independent of physical location.
    • E、None of the other alternatives apply

    正确答案:A

  • 第18题:

    Which of the following should an administrator utilize FIRST after installing a new HBA?()

    • A、 New Technology File Systems (NTFS)
    • B、 Digitally signed device drivers
    • C、 Virtual machine components
    • D、 Multiple RAID configurations

    正确答案:B

  • 第19题:

    Rate your level of proficiency with configuring and troubleshooting the Windows XP Professional desktop environment, including managing user profiles, configuring support for multiple locations, and configuring the Advanced Configuration Power Interface (ACPI).()

    • A、Very High
    • B、High
    • C、Moderate
    • D、Low
    • E、Very Low

    正确答案:A

  • 第20题:

    单选题
    When configuring VLANs on an autonomous access point,what must be configured on theconnected switchport?()
    A

    802.1q trunking

    B

    VTP trunking

    C

    ISL trunking

    D

    DPT trunking


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following should an administrator utilize FIRST after installing a new HBA?()
    A

     New Technology File Systems (NTFS)

    B

     Digitally signed device drivers

    C

     Virtual machine components

    D

     Multiple RAID configurations


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    An administrator has just installed a web server for the company's Internet site. After bringing the system online, customers notify the administrator that they cannot connect to the server. The administrator tests the web server from a workstation and can access the website. The customers continue to report issues. Which of the following is the MOST likely reason for this?()
    A

    The server's firewall is misconfigured.

    B

    The server's timeout feature is set incorrectly.

    C

    The web server was not installed properly.

    D

    The company firewall is misconfigured.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()
    A

    The names of the VLANs used by the SmartPorts are case insensitive

    B

    The ports may belong to a configurable data VLAN

    C

    The names of the VLANs used by the Smartports are not relevant

    D

    The ports may belong to many VLANs, depending on how many PCs are connected to each port.

    E

    The names of the VLANs used by the Smartports are case sensitive


    正确答案: B,E
    解析: 暂无解析

  • 第24题:

    问答题
    Which spanning tree mode will allow you to put multiple vlans into one instance?

    正确答案: MST
    解析: 暂无解析