A network administrator creates

题目

A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured?()

  • A、the port-channel 1 interface
  • B、the highest number member interface
  • C、all member interfaces
  • D、the lowest number member interface
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()

A. It enables an attacker to perform an IP sweep of devices.

B. It enables a hacker to know which operating system the system is running.

C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.

D. It creates a ping of death and can cause the entire network to be infected with a virus.


参考答案:C

第2题:

A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured?()

A.the port-channel 1 interface

B.the highest number member interface

C.all member interfaces

D.the lowest number member interface


参考答案:A

第3题:

The Ezonexam network administrator has just issued the "switchport trunk native vlan 998" command on switch VE2. What is the function of this command?

A.It designates VLAN 998 as the default for all unknown tagged traffic

B.It designates VLAN 998 for untagged traffic

C.It blocks VLAN 998 traffic from passing on the trunk

D.It creates a VLAN 998 interface

E.None of the above


正确答案:B

第4题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第5题:

What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

  • A、To protect the network in case someone inadvertently creates a physical loop in it
  • B、To ensure that if a device fails another device automatically take over for it
  • C、To allow management of all network devices
  • D、To aggregate logical network groups together at one central point

正确答案:A

第6题:

An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()

A.SSH

B.WEP

C.VPN

D.WPA


参考答案:D

第7题:

A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()

A.

B.

C.

D.


参考答案:B

第8题:

While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).

IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.

A.channels

B.Web browser

C.Internet data

D.Internet architecture


正确答案:A

第9题:

How does the Cisco Security Agent proactively stop both known and unknown attacks?()

  • A、 It reverse engineers and documents the attack
  • B、 It looks subjectively at network traffic for abnormal flows of behavior
  • C、 It creates a signature and updates the network security policies
  • D、 It actively monitors all vulnerable areas of the network

正确答案:B

第10题:

You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place.  Who can authorize the DHCP servers?()

  • A、 Chief information officer
  • B、 IT support staff in Boston
  • C、 IT support staff in New York
  • D、 Network administrator in Chicago
  • E、 Network administrator in New York

正确答案:A

更多相关问题