A network administrator creates a layer 3 EtherChannel, bundling four interfaces into channel group 1. On what interface is the IP address configured?()
第1题:
A. It enables an attacker to perform an IP sweep of devices.
B. It enables a hacker to know which operating system the system is running.
C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.
D. It creates a ping of death and can cause the entire network to be infected with a virus.
第2题:
A.the port-channel 1 interface
B.the highest number member interface
C.all member interfaces
D.the lowest number member interface
第3题:
The Ezonexam network administrator has just issued the "switchport trunk native vlan 998" command on switch VE2. What is the function of this command?
A.It designates VLAN 998 as the default for all unknown tagged traffic
B.It designates VLAN 998 for untagged traffic
C.It blocks VLAN 998 traffic from passing on the trunk
D.It creates a VLAN 998 interface
E.None of the above
第4题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第5题:
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()
第6题:
A.SSH
B.WEP
C.VPN
D.WPA
第7题:
A network administrator needs to configure a serial link between the main office and a remote location. The router at the remote office is a non-Cisco router.How should the network administrator configure the serial interface of the main office router to make the connection?()
A.
B.
C.
D.
第8题:
While the Internet is inherently insecure, businesses still need to preserve the privacy of data as it travels over the network. To help do that, the Internet Engineering Task Force an international group of network designers, operators, vendors, and researchers concerned with the evolution of(71)has developed a suite of(72)called Internet Protocol Security(IPSec).
IPSec creates a standard platform. to develop secure networks and electronic(73)between two machines. Secure tunneling via IPSec creates(74)connections in a network through which data packets can move. It creates these tunnels between remote users and within a local network. It also(75)each data packet in a new packet that contains the information neccessary to set up, maintain and tear down the tunnel when it's no longer needed.
A.channels
B.Web browser
C.Internet data
D.Internet architecture
第9题:
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
第10题:
You are designing a strategy to upgrade the DHCP servers after the new Active Directory structure is in place. Who can authorize the DHCP servers?()