You want to enhance the security within the LAN and prevent 

题目
多选题
You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()
A

Enable BPD guard

B

Disable CDP on ports where it is not necessary

C

Place unused ports in a common unrouted VLAN

D

Prevent automatic trunk configuration

E

Implement port security

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

  • A、 Enable root guard to mitigate ARP address spoofing attacks.
  • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
  • C、 Configure PVLANs to mitigate MAC address flooding attacks.
  • D、 Enable root guard to mitigate DHCP spoofing attacks.
  • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
  • F、 Configure port security to mitigate MAC address flooding  
  • G、 None of the other alternatives apply

正确答案:F

第2题:

You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()

  • A、Enable BPD guard
  • B、Disable CDP on ports where it is not necessary
  • C、Place unused ports in a common unrouted VLAN
  • D、Prevent automatic trunk configuration
  • E、Implement port security

正确答案:C,D

第3题:

Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units. The remote domain is connected to the main office network by using 56-Kbps connection, as shown in the Exhibit.

The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack.

You want to configure a group policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the group policies. You want to retain the domain administrator's access to the group policy configuration.

What should you do?

A.Configure a group policy for each OU in the west.litware.com domain. Configure a service pack software package for each group policy.

B.Configure a group policy for each OU in the litware.com domain. Configure a service pack software package for each group policy.

C.Configure a group policy for west.litware.com domain. Configure a service pack software package for the group policy.

D.Configure a group policy for the litware.com domain. Configure a service pack software package for the group policy.


正确答案:C
解析:Explanation:Grouppolicyfortheremotelocationimpliesaremotepolicyforthewest.litware.comdomain.ThereisnorequirementtohavedifferentpackagesindifferentOUs.ThereforethebestsolutionistoconfigureaGPOatthedomain-level,nottoeachindividualOUinthewest.litware.comdomain.Incorrectanswers:A:ItwouldrequirelessadministrativeefforttoconfiguretheGroupPolicyatdomainlevelinsteadofateachOU.B:Deployingthepackageinthelitware.comdomainwouldincreasethetrafficontheslow56KbitWANlink.D:Deployingthepackageinthelitware.comdomainwouldincreasethetrafficontheslow56KbitWANlink.

第4题:

You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT.  You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()

  • A、Use Security Configuration and Analysis to import the Hisecws.inf security template file to modify the default security settings.
  • B、Use security templates to create a security template file and import the security settings to modify the default security settings.
  • C、Use the local computer policy to disable the access to this computer from the network option.
  • D、Use Secedit.exe to reconfigure the computers’ default security settings to not allow anonymous access to the computers.

正确答案:A

第5题:

You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()

  • A、[edit interfaces]
  • B、[edit security zones]
  • C、[edit system services]
  • D、[edit security interfaces]

正确答案:B

第6题:

Which of the following should you enable to prevent a switch from forwarding packets with source  addresses that are outside an administratively defined group? ()

  • A、 DAI
  • B、 STP
  • C、 PVLAN
  • D、 port security

正确答案:D

第7题:

Which version of a view would you use if you just want a quick, easy view within your XPage?()

  • A、Data Table Control
  • B、View Control
  • C、Repeat Control
  • D、Filter by category View Control

正确答案:B

第8题:

You want to influence the root bridge selection within the Ezonexam LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)

A. Amount of RAM

B. Speed of the links

C. IOS Version

D. MAC Address

E. Bridge Priority

F. IP Address

G. Router ID


正确答案:DE
D,E

第9题:

In which scenario will you use the Flashback Transaction Query feature?()

  • A、 when you want to restore an important table that is dropped from the Recycle Bin
  • B、 when you want to obtain the SQL statements to undo the deletion of some important records from a table by a transaction
  • C、when you want to restore a dropped user’s schema
  • D、 when a row of a table is updated many times within a specific time period and you want all the versions of the row in the specified time period

正确答案:B

第10题:

You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()

  • A、Use the security configuration and analysis console to improve the HISECWS security  template file.
  • B、Use the local computer policy to disable the access this computer from the network option.
  • C、Use SECEDIT to reconfigure the computer default security settings to not allow anonymous  access to the computer.
  • D、Create a policy that excludes write access to the windows 2000 computers then apply the  policy to all non-windows 2000 computers.
  • E、None of the above, Windows 9X systems cannot be secured using security template files.

正确答案:E

更多相关问题