An administrator wants to prevent users from plugging in the

题目
单选题
An administrator wants to prevent users from plugging in their personal laptops and accessing the Internet without a member of the IT staff configuring the machine first. Which of the following would MOST likely be installed?()
A

Multilayer switch

B

CSU

C

Proxy server

D

IDS

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()

A. Change the default administrator password

B. Change the IP range of the wireless network

C. Hide the SSID

D. Disable WEP


参考答案:A

第2题:

An administrator is setting up a network and would like to prevent users from having the ability toplug their PC into the network to receive an IP address.Which of the following addressing schemes should the technician use?()

A.NAT

B.Dynamic

C.Subnetting

D.Static


参考答案:D

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

  • A、BPDU
  • B、Port security
  • C、RSTP
  • D、STP
  • E、VTP
  • F、Blocking mode

正确答案:B

第5题:

Which of the following devices would be installed if an administrator wants to control a group of servers from a remote location?()

  • A、 VLAN
  • B、 KVM
  • C、 IP KVM
  • D、 RAID

正确答案:C

第6题:

Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()

A. net view

B. ipconfig

C. dig

D. ifconfig


参考答案:C

第7题:

What must an administrator do to prevent new telnet users from connecting to the system?()

A.rmdev -l /dev/pts

B.touch /etc/nologin

C.chdev -l sys0 -a nologin

D.chuser -a login=false ALL


参考答案:B

第8题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第9题:

A technician wants to prevent employees from installing software on company computers. In which of the following groups should the employee accounts be placed?()rs

  • A、Power Users
  • B、Users
  • C、Guests
  • D、Administrato

正确答案:B

第10题:

A user states that the wireless router keeps rebooting while the power to the other equipment stays on. Which of the following should the technician perform to prevent users from rebooting the router?()

  • A、Change the default administrator password
  • B、Change the IP range of the wireless network
  • C、Hide the SSID
  • D、Disable WEP

正确答案:A

更多相关问题