A.IP
B.ICMP
C.TCP
D.UDP
第1题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
A. Source IP and browser
B. Source IP and certificate
C. Certificate and Host Checker
D. Host Checker and source IP
第2题:
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
第3题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第4题:
Why would a network administrator configure port security on a switch?()
第5题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第6题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第7题:
Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()
第8题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第9题:
BPDU
Port security
RSTP
STP
VTP
Blocking mode
第10题:
Port security needs to be globally enabled.
Port security needs to be enabled on the interface.
Port security needs to be configured to shut down the interface in the event of a violation.
Port security needs to be configured to allow only one learned MAC address.
Port security interface counters need to be cleared before using the show command.
The port security configuration needs to be saved to NVRAM before it can become active.
第11题:
IP
ICMP
TCP
UDP
第12题:
DAI
STP
PVLAN
port security
第13题:
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()
A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10
第14题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第15题:
Why would a network administrator configure port security on a switch?()
第16题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第17题:
An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()
第18题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第19题:
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
第20题:
Which of the following are advantages of using Dynamic Host Configuration Protocol?()
第21题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第22题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第23题:
To prevent unauthorized Telnet access to a switch port.
To limit the number of Layer 2 broadcasts on a particular switch port.
To prevent unauthorized hosts from accessing the LAN.
To protect the IP and MAC address of the switch and associated ports.
To block unauthorized access to the switch management interfaces over common TCP ports.