CMS专题

单选题An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()A Disable SSIDB WPAC MAC filte

题目
单选题
An administrator wants to limit access of a wireless network without requiring authorized users to enter a password or network key. Which of the following methods would MOST likely be implemented on the wireless network?()
A

Disable SSID

B

WPA

C

MAC filtering

D

RAS

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()

A. Operating system type of the connected PCs

B. Location of the wireless router

C. Number of PCs that will access the network

D. Number of available Ethernet ports on the router


参考答案:B

第2题:

An administrator wants to limit access of a wireless network without requiring authorized users toenter a password or network key.Which of the following methods would MOST likely be implemented on the wireless network?()

A. Disable SSID

B. WPA

C. MAC filtering

D. RAS


参考答案:A

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

Why would a network administrator configure port security on a switch?()

  • A、to prevent unauthorized Telnet access to a switch port
  • B、to limit the number of Layer 2 broadcasts on a particular switch port
  • C、to prevent unauthorized hosts from accessing the LAN
  • D、to protect the IP and MAC address of the switch and associated ports
  • E、to block unauthorized access to the switch management interfaces over common TCP ports

正确答案:C

第5题:

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()

A.Network security

B.Virtual Private Network (VPN)

C.Wireless network

D.Content networking


参考答案:A

第6题:

A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()

A. WEP encryption

B. Channel rotation

C. Disable SSID

D. WPA encryption


参考答案:D

第7题:

A ______ system placed between the company network and the outside world may limit outside access to the internal network.

A.firewall

B.modem

C.gateway

D.key


正确答案:A
解析:译文的含义是:()系统在公司网络和外部世界之间,可以限制外界访问内部网络。选项A~D的含义分别是防火墙、调制解调器、网关和密钥。

第8题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?

A. BPDU

B. Port security

C. RSTP

D. STP

E. VTP

F. Blocking mode


正确答案:B
B 解析:Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.

When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.

The port's behavior. depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.

第9题:

Which of the following should be used to restrict access to a wireless network?()

  • A、Port forwarding
  • B、Enable SSID broadcast
  • C、Wireless encryption
  • D、Enable DMZ

正确答案:C

第10题:

A service provider wants to prevent the repeat of a denial of service (DoS) attack that recently disabled Internet access for several thousand customers. Which Cisco solution best matches this business need?()

  • A、Network security
  • B、Virtual Private Network (VPN)
  • C、Wireless network
  • D、Content networking

正确答案:A

更多相关问题