A network administrator needs to configure port security on a switch.which two statements are true?()
第1题:
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
A. Configure port Fa0/1 to accept connections only from the static IP address of the server.
B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
C. Configure the MAC address of the server as a static entry associated with port Fa0/1.
D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
第2题:
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A.Port security needs to be globally enabled.
B.Port security needs to be enabled on the interface.
C.Port security needs to be configured to shut down the interface in the event of a violation.
D.Port security needs to be configured to allow only one learned MAC address.
E.Port security interface counters need to be cleared before using the show command.
F.The port security configuration needs to be saved to NVRAM before it can become active.
第3题:
Why would a network administrator configure port security on a switch?()
第4题:
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1 (Choose two.)()。
第5题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
第6题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
第7题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第8题:
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()
第9题:
PAT
ACLs
Subnet masking
Port blocking
第10题:
Default gateway
The ports on the switch
Port security on the servers switch port
Ethernet cable
第11题:
Port security can be configured for ports supporting VoIP.
With port security configured, four MAC addresses are allowed by default.
The network administrator must manually enter the MAC address for each device in order for the switch to allow connectivity.
Withsecurity configured, only one MAC addresses is allowed by default.
Port security cannot be configured for ports supporting VoIP.
第12题:
To prevent unauthorized Telnet access to a switch port.
To limit the number of Layer 2 broadcasts on a particular switch port.
To prevent unauthorized hosts from accessing the LAN.
To protect the IP and MAC address of the switch and associated ports.
To block unauthorized access to the switch management interfaces over common TCP ports.
第13题:
A.The network administrator can apply port security to dynamic access ports
B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
D.The network administrator can apply port security to EtherChannels.
E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第14题:
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()
第15题:
You are the network administrator of a small Layer 2 network with 50 users. Lately, users have beencomplaining that the network is very slow. While troubleshooting, you notice that the CAM table of yourswitch is full, although it supports up to 12, 000 MAC addresses. How can you solve this issue and preventit from happening in the future?()
第16题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第17题:
A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()
第18题:
You need to configure port security on switch R1. Which two statements are true about this technology? ()
第19题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第20题:
Configure port Fa0/1 to accept connections only from the static IP address of the server.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
第21题:
Setting up a custom community name
Configuring the network to block traffic on port 161
Configuring the Windows Firewall to block port 161
Setting SNMP to read only on the devices
Installing new MIBs
第22题:
The network administrator can apply port security to dynamic access ports
The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
The network administrator can apply port security to EtherChannels.
When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.
第23题:
Port security needs to be globally enabled.
Port security needs to be enabled on the interface.
Port security needs to be configured to shut down the interface in the event of a violation.
Port security needs to be configured to allow only one learned MAC address.
Port security interface counters need to be cleared before using the show command.
The port security configuration needs to be saved to NVRAM before it can become active.