参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A BridgeB FirewallC Port replicatorD Gateway”相关问题
  • 第1题:

    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

    A. Network layer firewall

    B. Stateful inspection firewall

    C. Zone aware firewall

    D. Application layer firewall


    参考答案:D

  • 第2题:

    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()

    A.NTP

    B.FTP

    C.RTP

    D.IGMP


    参考答案:A

  • 第3题:

    Which of the following features would hide internal IP addresses from the Internet?()

    • A、Network Address Translation
    • B、Port forwarding
    • C、Quality of Service
    • D、SSID broadcast

    正确答案:A

  • 第4题:

    When configuring unified ports on a 5548 switch, which port ordering must be respected?()

    • A、 Fibre Channel ports must be configured from the first port in the module.
    • B、 Ethernet ports must be configured from the last port in the module.
    • C、 Fibre Channel ports must be configured from the last port in the module.
    • D、 Ethernet ports must be configured from the first port in the module.

    正确答案:C,D

  • 第5题:

    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()

    • A、Setting up a custom community name
    • B、Configuring the network to block traffic on port 161
    • C、Configuring the Windows Firewall to block port 161
    • D、Setting SNMP to read only on the devices
    • E、Installing new MIBs

    正确答案:D,E

  • 第6题:

    A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()

    • A、Four port switch
    • B、Four port wireless router
    • C、Four port WAP
    • D、Four port hub

    正确答案:B

  • 第7题:

    Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()

    • A、NAS
    • B、Firewall
    • C、Hub
    • D、Bridge

    正确答案:B

  • 第8题:

    Which of the following would restrict traffic from a specific host to a network?()

    • A、MIBs
    • B、NAS
    • C、ACL
    • D、SMTP

    正确答案:C

  • 第9题:

    Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()

    • A、Bridge
    • B、Firewall
    • C、Port replicator
    • D、Gateway

    正确答案:B

  • 第10题:

    多选题
    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()
    A

    Setting up a custom community name

    B

    Configuring the network to block traffic on port 161

    C

    Configuring the Windows Firewall to block port 161

    D

    Setting SNMP to read only on the devices

    E

    Installing new MIBs


    正确答案: D,E
    解析: 暂无解析

  • 第11题:

    单选题
    A computer is able to ping other devices on the same network but is unable to ping devices onanother network. Which of the following needs to be configured?()
    A

    DNS primary server

    B

    Host route

    C

    Proxy ARP

    D

    Default gateway


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()
    A

    Bridge

    B

    Firewall

    C

    Port replicator

    D

    Gateway


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following devices transmits timed broadcasts onto an active network?()

    A. Bridge

    B. Unmanaged switch

    C. DHCP client

    D. Firewal


    参考答案:C

  • 第14题:

    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

    • A、Network layer firewall
    • B、Stateful inspection firewall
    • C、Zone aware firewall
    • D、Application layer firewall

    正确答案:D

  • 第15题:

    A computer is able to ping other devices on the same network but is unable to ping devices onanother network. Which of the following needs to be configured?()

    • A、DNS primary server
    • B、Host route
    • C、Proxy ARP
    • D、Default gateway

    正确答案:D

  • 第16题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第17题:

    Which of the following would need to be implemented on a wireless router to allow network accessbased on a passphrase that the administrator would supply?()

    • A、WPA-PSK encryption
    • B、SSID broadcast
    • C、Port forwarding
    • D、MAC filtering

    正确答案:A

  • 第18题:

    Which of the following devices transmits timed broadcasts onto an active network?()

    • A、Bridge
    • B、Unmanaged switch
    • C、DHCP client
    • D、Firewal

    正确答案:C

  • 第19题:

    Which of the following devices can be installed on individual computers throughout the network?()

    • A、NIPS
    • B、Network-based firewall
    • C、VPN concentrator
    • D、Host-based firewall

    正确答案:D

  • 第20题:

    Which of the following is required if ports from VLANs on two separate switches need to broadcastto each other?()

    • A、Port mirroring
    • B、VPN
    • C、Trunking
    • D、Port authentication

    正确答案:C

  • 第21题:

    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()

    • A、NTP
    • B、FTP
    • C、RTP
    • D、IGMP

    正确答案:A

  • 第22题:

    单选题
    Which of the following would restrict traffic from a specific host to a network?()
    A

    MIBs

    B

    NAS

    C

    ACL

    D

    SMTP


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following network protocols is used to ensure consistent time across network devices on the domain?()
    A

    NTP

    B

    FTP

    C

    RTP

    D

    IGMP


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A user has a small network of four computers that they want to connect to a single cable modem. Which of the following devices would allow the user to do this?()
    A

    Four port switch

    B

    Four port wireless router

    C

    Four port WAP

    D

    Four port hub


    正确答案: D
    解析: 暂无解析