CMS专题

多选题For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).ADisable all 802.11 trafficBDisable the SSID from broadcastingCDisable WPADEnable Bluetooth on

题目
多选题
For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).
A

Disable all 802.11 traffic

B

Disable the SSID from broadcasting

C

Disable WPA

D

Enable Bluetooth only communication

E

Change the default admin password

F

Disable WEP

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

A. intrusion protection

B. identity

C. secure connectivity

D. security management


参考答案:B, D

第2题:

An administrator has decided to use a Shared Ethernet Adapter (SEA) as part of a virtualized environment. Due to the expected traffic across the SEA, the administrator has decided to use an aggregation of two physical Ethernet adapters, ent0 and ent1 as the backing device in the VIO server to increase the available network bandwidth.  Which of the following commands would successfully create an aggregation device within a VIO server? ()

  • A、 mkvdev -lnagg ent0,ent1
  • B、 mkdev -lnagg -d ent0,ent1
  • C、 mkvdev -t etherchannel -a ent0,ent1
  • D、 mkdev -c adapter -s pseudo -t etherchannel ent0,ent1

正确答案:A

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

  • A、intrusion protection
  • B、identity
  • C、secure connectivity
  • D、security management

正确答案:B,D

第5题:

An administrator has added a new device to a system and wants to determine if it has been correctly added to the ODM database. Which command would the system administrator use?()

  • A、odmget
  • B、odmadd
  • C、odmshow
  • D、odmcreate

正确答案:A

第6题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第7题:

An administrator has added an additional network adapter to each cluster node. The adapters  have been configured and tested, and the /etc/hosts file has been updated. However,the adapters do not appear in the pick list when the administrator tries to define the adapters to HACMP.  What would be required to correct this problem?()  

  • A、 Rerun autodiscovery.
  • B、 Synchronize the cluster.
  • C、 Restart cluster services.
  • D、 Delete and recreate the adapters.

正确答案:A

第8题:

A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()

A. The host needs to open the telnet port.

B. The host needs a route for the translated address.

C. The administrator must use a proxy-arp policy for the translated address.

D. The administrator must use a security policy, which will allow communication between the zones.


参考答案:C

第9题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第10题:

For added security, a network administrator has decided to lock down the wireless network. Which of the following are ways to accomplish this? ()(Select TWO).

  • A、Disable all 802.11 traffic
  • B、Disable the SSID from broadcasting
  • C、Disable WPA
  • D、Enable Bluetooth only communication
  • E、Change the default admin password
  • F、Disable WEP

正确答案:B,E

更多相关问题