單項選擇題In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()

A.private VLANs
B.port security
C.BPDU guard
D.dynamic ARP inspection
E.DHCP snooping


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What is true about access control on bridged and routed VLAN traffic?()

A.Router ACLs can be applied to the input and output directions of a VLAN interface
B.Bridged ACLs can be applied to the input and output directions of a VLAN interface
C.Only router ACLs can be applied to a VLAN interface
D.VLAN maps and router ACLs can be used in combination
E.VLAN maps can be applied to a VLAN interfac

2.單項選擇題Switch SW1 has been configured with Private VLANs. With that type of PVLAN port should thedefault gateway be configured?()

A.Trunk
B.Isolated
C.Primary
D.Community
E.Promiscuous
F.None of the other alternatives apply

3.單項選擇題

Refer to the exhibit. The user who is connected to interface FastEthernet 0/1 is on VLAN 10 andcannot access network resources. On the basis of the information in the exhibit, which commandsequence would correct the problem?()

A.SW1(config)# interface fastethernet 0/1   SW1(config-if)# no shut
B.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access   SW1(config-if)# switchport access vlan 10
C.SW1(config)# vlan 10   SW1(config-vlan)# state active
D.SW1(config)# interface fastethernet 0/1   SW1(config-if)# switchport mode access
E.SW1(config)# vlan 10   SW1(config-vlan)# no shut

5.多項選擇題The administrator has issue the "show vlan id 5" command. What will this command display?()

A.Ports in VLAN 5
B.Utilization
C.VLAN information on port 0/5
D.Filters
E.MTU and type

最新試題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

題型:問答題

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

題型:單項選擇題

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:問答題

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:單項選擇題

Drag the DSL local loop topic on the left to the correct descriptions on the right.

題型:問答題

Authentication is the process of determining if a user or identity is who they claim to be. Refer tothe exhibit. Which statement about the authentication process is correct?()

題型:單項選擇題

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()

題型:多項選擇題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

題型:單項選擇題