Enable BPD guard
Disable CDP on ports where it is not necessary
Place unused ports in a common unrouted VLAN
Prevent automatic trunk configuration
Implement port security
第1题:
You are responsible for increasing the security within the Company LAN. Of the following choices listed below, which is true regarding layer 2 security and mitigation techniques? ()
第2题:
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()
第3题:
Your network consists of numerous domains within a LAN, plus one remote location that is configured as another domain within the tree. Each domain contains several organizational units. The remote domain is connected to the main office network by using 56-Kbps connection, as shown in the Exhibit.
The remote location is running a previous service pack for Windows 2000, and the LAN is running the most recent service pack.
You want to configure a group policy for the remote location so that users can repair a problem with a service pack system file. You also want to reduce the traffic on the LAN and ease administration of the group policies. You want to retain the domain administrator's access to the group policy configuration.
What should you do?
A.Configure a group policy for each OU in the west.litware.com domain. Configure a service pack software package for each group policy.
B.Configure a group policy for each OU in the litware.com domain. Configure a service pack software package for each group policy.
C.Configure a group policy for west.litware.com domain. Configure a service pack software package for the group policy.
D.Configure a group policy for the litware.com domain. Configure a service pack software package for the group policy.
第4题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第5题:
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
第6题:
Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()
第7题:
Which version of a view would you use if you just want a quick, easy view within your XPage?()
第8题:
You want to influence the root bridge selection within the Ezonexam LAN. Which two values are used by spanning tree protocol to elect a root bridge? (Choose two.)
A. Amount of RAM
B. Speed of the links
C. IOS Version
D. MAC Address
E. Bridge Priority
F. IP Address
G. Router ID
第9题:
In which scenario will you use the Flashback Transaction Query feature?()
第10题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()