首页/ 题库 / [多选题]The network security的答案

The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。

多选题
2022-01-04 01:09
A、Switch1(config-if)# switchport port-security maximum 1
B、Switch1(config)# mac-address-table secure
C、Switch1(config)# access-list 10 permit ip host
D、Switch1(config-if)# switchport port-security violation shutdown
E、Switch1(config-if)# ip access-group 10
查看答案

正确答案
A| D

试题解析

感兴趣题目

You are the network administrator in the New York office of TestKing.
The company network consists of a single Active Directory domain The New York office currently contains one Windows Server 2003 file server named TestKingA.
All file servers in the New York office are in an organizational unit (OU) named
New York Servers. You have been assigned the Allow - Change permission for a
Group Policy object (GPO) named NYServersGPO, which is linked to the New
York Servers OU.
The written company security policy states that all new servers must be configured
with specified predefined security settings when the servers join the domain. These
settings differ slightly for the various company offices.
You plan to install Windows Sever 2003, on 15 new computers, which all functions
as file servers. You will need to configure the specified security settings on the new
file servers.
TestKingA currently has the specified security settings configured in its local
security policy. You need to ensure that the security configuration of the new file
servers is identical to that of TestKingA. You export a copy of TestKingA's local
security policy settings to a template file.
You need to configure the security settings of the new servers, and you want to use
the minimum amount of administrative effort.
What should you do?()

() provides the head or pressure to supply the domestic water where required.
Given the host IP address of 192.168.100.60 and a network mask of 255.255.255.224 (or /27), which address represents the correct network address for the referenced host?()
Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" > "Sensors" > "Sensor Event Policies" > [rule name] to accomplish this?()
Which security or functional zone name has special significance to the Junos OS?()
The Testking network is implementing dialup services for their remote employees.Testking uses several different Layer 3 protocols on the network. Authentication ofthe users connecting to the network is required for security. Additionally, some employees will be dialing long distance and will need callback support.Which protocol is the best choice for these remote access services?()

Your company's corporate network uses Network Access Protection (NAP).Users are able to connect to the corporate network remotely.You need to ensure that data transmissions between remote client computers and the corporate network are as secure as possible.
What should you do?()

There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(71). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(72) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(73) of service attacks or steal(74) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(75) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()
相关题目
All WAN links inside the ABC University network use PPP with CHAP for authentication security. Which command will display the CHAP authentication process as it occur between two routers in the network?()
You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()
For the new country to survive,()for its people to enjoy prosperity, new economic policies will be required
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
Where the contract is to insure the subject-matter at and from,or from one place to another or others,the policy is called a().
SMB network decision makers commonly site which of the following as typical network requirements?()
our network contains a server that runs window server 2008. The serve has the network policy server(NPS) service role installed. You need to allow only members of a global group named group1 VPN access to the network. What should you do?()
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
The network security policy for Ezonexam requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should be automatically disabled. Which two commands must the Ezonexam network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two)

You are the domain administrator for TestKing's Active Directory domain named All client computers run Windows XP Professional.
You need to implement a solution for managing security updates on client computers. You plan to use a Windows Server 2003 computer to manage security updates. Your solution for managing security updates must meet the following requirements:
1. You must not purchase additional software or licences.
2. Security updates must be installed automatically.
3. You must be able to control which updates are available to install.
4. Security updates must synchronize automatically with the latest updates offered by Microsoft.
You need to implement a solution for managing security updates that meets the requirements.
What should you do?()

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.
Virus Security Software is designed to detect, eliminate or quarantine computer viruses before they are able to harm a computer or server networked system.
Which of the following is/are TRUE regarding lashing requirements to secure vehicles aboard Ro-Ro vessels? ()
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network.Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement.What should you do?()
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()

You are the network administrator for The network consists of a single Active Directory domain named The domain contains Windows Server 2003 computers and Windows XP Professional computers.
The domain contains a group named SalesAdmin. Members of the SalesAdmin group need the permission to add Group Policy links and create Group Policy objects (GPOs) for only the Sales organizational unit (OU).
You need to configure the domain to provide the SalesAdmin group with the minimum permissions necessary to meet these requirements.
What should you do?()

In order to communicate the threat at a port facility or for a ship, the Contracting Government will set the appropriate security levels Security level 1 corresponds to()
广告位招租WX:84302438

免费的网站请分享给朋友吧