首页/ 题库 / [单选题]A network administra的答案

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

单选题
2022-02-23 00:06
A、BPDU
B、Port security
C、RSTP
D、STP
E、VTP
F、Blocking mode
查看答案

正确答案
B

试题解析
B 解析:Explanation:Understanding How Port Security Works:You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

标签:
感兴趣题目
Which command helps a network administrator to manage memory by displaying flash memory and NVRAM utilization?()
A router leams about a remote network from EIGRP.OSPF. and a static route. Assuming all routing protocols are using their default administrative distance, which route will the router use to forward data to the remote network?()
A router learns about a remote network from EIGRP, OSPF, and a static route. Assuming all routing protocols are using their default administrative distance, which route will the router use to forward data to the remote network()。
You use Microsoft .NET Framework 4 to create a Windows Forms application. You need to allow the user interface to use the currently configured culture settings in the Control Panel. Which code segment should you use?()
Which product allows a storage administrator to set storage utilization alerts for the DS8000, DS5000, SAN Volume Controller, and EMC DMX?()
If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
Router R1 needs to be configured to advertise a specific network. Which of the followingcommands would you use if you wanted to advertise the subnet 154.2.1.0 255.255.255.0 to the EBGP neighbors on your subnet?()
In a Routed 1483 network, a provider doesn't want to configure static routes for its customer networks. Which command allows the ERX to obtain the framed route stored on the RADIUS server?()
A network administrator needs to verify that switch interface 0/5 has been assigned to the Sales VLA.N. Which command will accomplish this task?()
Flow control is a function that prevents network congestion by ensuring that(71)do not overwhelm(72)with data. There are three commonly used methods for handling network congestion.(73)is used by network devices to temporarily store bursts of excess data in memory until they can be processed. (74)are used by receiving devices to help prevent their buffers from overflowing.(75)is a flow -control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
Flow control is a function that prevents network congestion by ensuring that(66)do not over-whelm(67)with data. There are three commonly used methods for handling network congestion.(68)is used by network devices to temporarily store bursts of excess data in memory until they can be processed.(69)are used by receiving devices to help prevent their buffers from overflowing.(70)is a flow-control scheme in which the source device requires an acknowledgment from the destination after a certain number of packets have been transmitted.
相关题目
Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
You are the network administrator for passguide.com. Which device will you install in your computer to make wireless connections you and a network?()
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
A new subnet with 12 hosts has been added to the network. Which subnet address should this network use to provide enough useable addresses while wasting the fewest addresses()。
You are securing a network for TestKing and want to apply an ACL (access control list) to an interface of a router. Which one of the following commands would you use?()
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
Which of the following data network would you implement if you wanted a wireless network that had a relatively high data rate, but was limited to very short distances?()
The Ezonexam network administrator wants to use a router named VE1 to segment the local network. What are some of the advantages of using VE1 to segment the network? (Choose two)
A system administrator installed a new switch using a script to configure it. IP connectivity was tested using pings to SwitchB.Later attempts to access NewSwitch using Telnet from SwitchA faileD.Which statement is true?()
On a Cisco network, which of the following modes of flow control are commonly used to mitigate the effects of busy data networks?()
Which two statements about the use of VLANs to segment a network are true?()
Which IOS command would you use to find out which networks are routed by a particular OSPF process()
Network equipment supporting the use of flow control mechanisms has been recently installed. What is the purpose of flow control in a data network?()
The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)

An administrator wants to mirror an importantfilesystem between two disks without mirroring the entire volume group.
Which command should be used?()

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
As a network administrator, you will need to decide on the appropriate network devices to use. Which of the following correctly describes the roles of devices in a WAN? (Choose three)
A network administrator needs to configure a router for a Frame Relay connection to a non-Cisco router. Which of the following commands will prepare the WAN interface for this connection?()
广告位招租WX:84302438

免费的网站请分享给朋友吧