A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do

题目

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C. Configure the MAC address of the server as a static entry associated with port Fa0/1.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


相似考题
更多“A network administrator wants to ensure that only the server can connect to port Fa0/1 on ”相关问题
  • 第1题:

    Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()

    • A、Open port 1423 on the firewall
    • B、Open port 1723 on the firewall
    • C、Open port 3389 on the firewall
    • D、Open port 6000 on the firewall

    正确答案:B

  • 第2题:

    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

    • A、NAC can authenticate using 802.1X and IBNS cannot
    • B、NAC can ensure only compliant machines connect and IBNS cannot
    • C、NAC can ensure access to the correct network resources and IBNS cannot
    • D、NAC can manage user mobility and reduce overhead costs and IBNS cannot

    正确答案:B

  • 第3题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第4题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()

    • A、Default gateway
    • B、The ports on the switch
    • C、Port security on the server's switch port
    • D、Ethernet cable

    正确答案:A

  • 第5题:

    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You enable and configure Terminal Server on a server named Server1. A firewall separates Server1 from the internal network. Internal users report that they cannot connect to Server1 by using Remote Desktop Connection. You need to ensure that the users can connect to Server1 by using Remote Desktop Connection. Which port should you open on the firewall? ()

    • A、389
    • B、3268
    • C、3389
    • D、5900

    正确答案:C

  • 第6题:

    You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local computer. However, client computers cannot connect to the SQL Server instance.You need to identify the most likely cause of the connection issues. What should you do first?()

    • A、Ensure that port 1433 is open in your firewall.
    • B、Ensure that port 443 is open in your firewall.
    • C、Ensure that client computers connect by using Shared Memory protocol.
    • D、Ensure that the server is not paused.

    正确答案:A

  • 第7题:

    Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()

    • A、Open port 1423 on the firewall.
    • B、Open port 1723 on the firewall.
    • C、Open port 3389 on the firewall.
    • D、Open port 6000 on the firewall.

    正确答案:B

  • 第8题:

    Your network contains a server named Server1 that has Windows Server 2008 R2.An administrator runs the following command on Server1: netsh.exe advfirewall reset You discover that you can no longer access Server1 on port 3389.You need to ensure that you can access Server1 on port 3389.Which firewall rule should you enable?()

    • A、File and Printer Sharing (Echo Request ICMPv4-In)
    • B、File and Printer Sharing (SMB-In)
    • C、Remote Desktop (TCP-In)
    • D、Remote Service Management (RPC)

    正确答案:C

  • 第9题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()
    A

     Default gateway

    B

     The ports on the switch

    C

     Port security on the servers switch port

    D

     Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第10题:

    多选题
    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()
    A

    Configure port Fa0/1 to accept connections only from the static IP address of the server.

    B

    Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

    C

    Configure the MAC address of the server as a static entry associated with port Fa0/1.

    D

    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

    E

    Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

    F

    Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    多选题
    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()
    A

    Setting up a custom community name

    B

    Configuring the network to block traffic on port 161

    C

    Configuring the Windows Firewall to block port 161

    D

    Setting SNMP to read only on the devices

    E

    Installing new MIBs


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第13题:

    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

    • A、Configure port Fa0/1 to accept connections only from the static IP address of the server.
    • B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
    • C、Configure the MAC address of the server as a static entry associated with port Fa0/1.
    • D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
    • E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
    • F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

    正确答案:C,E

  • 第14题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()

    • A、 Default gateway
    • B、 The ports on the switch
    • C、 Port security on the servers switch port
    • D、 Ethernet cable

    正确答案:A

  • 第15题:

    An AIX server has 2 network interfaces and the system administrator wants to enable the users on the locally configured network interface to be able to connect to systems configured on the global network interface.  How is it accomplished?()

    • A、Enable routed on the server
    • B、Enable gated on the server
    • C、Enable ipforwarding on the server
    • D、Set network options back to default

    正确答案:C

  • 第16题:

    Your network consists of a single Active Directory domain. The network contains two servers named Server1 and Server2 that run Windows Server 2003 Service Pack 2 (SP2).You log on to Server1 by using the Administrator account for the domain. You open Event Viewer and attempt to connect to Server2 but receive the following error message.You verify that you can connect to Server2 by using Windows Explorer and that Windows Firewall is disabled on Server2. You open the Services snap-in on Server2 as shown in the exhibit.You need to ensure that you can connect to Server2 remotely by using Event Viewer.  What should you do on Server2?()

    • A、Add the Administrator account to the HelpServicesGroup.
    • B、Set the Startup Type for the Remote Registry service to Automatic and then start the service.
    • C、Set the Startup Type for the Secondary Logon service to Disabled and then stop the service.
    • D、Set the Startup Type for the Special Administration Console Helper service to Automatic and then start the service.

    正确答案:B

  • 第17题:

    Your network contains an internal network and a perimeter network.You have one Exchange Server 2010 server on the internal network. You install Windows Server 2008 R2 on a new server in the perimeter network.You need to ensure that you can install the Edge Transport server role on the new server. What should you do?()

    • A、Join the new server to an Active Directory domain.
    • B、Install Active? Directory Lightweight Directory Services on the new server.
    • C、Run ImportEdgeConfig.ps1 on the existing Exchange Server 2010 server.
    • D、Open TCP port 88 and TCP port 3268 on the firewall between the perimeter network and the internal network.

    正确答案:B

  • 第18题:

    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()

    • A、Network Adapter
    • B、BIOS
    • C、Processor
    • D、COM 1

    正确答案:D

  • 第19题:

    单选题
    Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()
    A

    Network Adapter

    B

    BIOS

    C

    Processor

    D

    COM 1


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You enable and configure Terminal Server on a server named Server1. A firewall separates Server1 from the internal network. Internal users report that they cannot connect to Server1 by using Remote Desktop Connection. You need to ensure that the users can connect to Server1 by using Remote Desktop Connection. Which port should you open on the firewall? ()
    A

    389

    B

    3268

    C

    3389

    D

    5900


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Users report that they are unable to connect to a server. An administrator confirms that it is unreachable across the network. Other administrators have been working in the server room throughout the day.  Which of the following is the NEXT step the administrator should take?()
    A

     Verify the configuration of the connected port on the network switch.

    B

     Reboot the server.

    C

     Install a new NIC on the server.

    D

     Verify that network cables are connected.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for The network consists of a single Active Directory domain. The domain contains 20 Windows Server 2003 computers and 400 Windows XP Professional computers. Software Update Services (SUS) is installed on a server named Testking2. The network security administrator wants you to ensure that the administrative password is not compromised when an administrator connects to Testking2's SUSAdmin Web site remotely by using HTTP. You want only SSL to be used to connect to the SUSAdmin Web site. The network security administrator creates a digital certificate and enables communication for SSL on port 443 of Testking2. However, administrators are still able to connect to the SUSAdmin Web site by using HTTP. You need to ensure that communication to the SUSAdmin Web site is always secure. What should you do?()
    A

    Disable port 80 on the SUSAdmin Web site.

    B

    Require 128-Bit SSL on all directories related to the SUSAdmin Web site.

    C

    Change the default Web site to require 128-Bit SSL.

    D

    Enable IPSec on Testking2 with the Request Security IPsec template.


    正确答案: D
    解析: 暂无解析