An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

题目

An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

  • A、 PAT
  • B、 ACLs
  • C、 Subnet masking
  • D、 Port blocking
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?()

A.nslookup

B. nbtstat

C. dig

D. netstat


参考答案:B

第2题:

A network administrator needs to configure port security on a switch.which two statements are true? ()

A.The network administrator can apply port security to dynamic access ports

B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

D.The network administrator can apply port security to EtherChannels.

E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.


参考答案:C, E

第3题:

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)

A.Configure port Fa0/1 to accept connections only from the static IP address of the server

B.Configure the MAC address of the server as a static entry associated with port Fa0/1

C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectors

D.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server

E.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address


正确答案:BD
解析:Explanation:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. When a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第4题:

An administrator needs to diagnose problems with a WINS server. Which of the following toolsshould be used?()

  • A、nslookup
  • B、nbtstat
  • C、dig
  • D、netstat

正确答案:B

第5题:

An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()

  • A、255.0.0.0
  • B、255.255.0.0
  • C、255.255.252.0
  • D、255.255.255.0

正确答案:C

第6题:

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

A. Configure port Fa0/1 to accept connections only from the static IP address of the server.

B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

C. Configure the MAC address of the server as a static entry associated with port Fa0/1.

D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


参考答案:C, E

第7题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第8题:

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()

A. Caching engines

B. QoS

C. Traffic shaping

D. Load balancing


参考答案:D

第9题:

A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()

  • A、Update the antivirus application
  • B、Install critical update security patches
  • C、Adjust the software firewall settings
  • D、Replace the current antivirus program

正确答案:C

第10题:

While reviewing the backup logs a server administrator notices that a backup job for an application server on the same subnet has failed. Which of the following is MOST likely the problem?()

  • A、The remote agent was not running.
  • B、The management card has failed.
  • C、The proxy server was blocking access.
  • D、The hardware firewall was blocking access.

正确答案:A

更多相关问题