For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。A.IPB.ICMPC.TCPD.UDP

题目
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

A.IP

B.ICMP

C.TCP

D.UDP


相似考题
参考答案和解析
参考答案:B
更多“For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。 ”相关问题
  • 第1题:

    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

    A. Source IP and browser

    B. Source IP and certificate

    C. Certificate and Host Checker

    D. Host Checker and source IP


    参考答案:D

  • 第2题:

    Why would a network administrator configure port security on a switch()。

    A.to prevent unauthorized Telnet access to a switch port

    B.to limit the number of Layer 2 broadcasts on a particular switch port

    C.to prevent unauthorized hosts from accessing the LAN

    D.to protect the IP and MAC address of the switch and associated ports

    E.to block unauthorized access to the switch management interfaces over common TCP ports


    参考答案:C

  • 第3题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第4题:

    Why would a network administrator configure port security on a switch?()

    • A、to prevent unauthorized Telnet access to a switch port
    • B、to limit the number of Layer 2 broadcasts on a particular switch port
    • C、to prevent unauthorized hosts from accessing the LAN
    • D、to protect the IP and MAC address of the switch and associated ports
    • E、to block unauthorized access to the switch management interfaces over common TCP ports

    正确答案:C

  • 第5题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第6题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第7题:

    Which of the following should you enable to prevent a switch from forwarding packets with source  addresses that are outside an administratively defined group? ()

    • A、 DAI
    • B、 STP
    • C、 PVLAN
    • D、 port security

    正确答案:D

  • 第8题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第9题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第10题:

    多选题
    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
    A

    Port security needs to be globally enabled.

    B

    Port security needs to be enabled on the interface.

    C

    Port security needs to be configured to shut down the interface in the event of a violation.

    D

    Port security needs to be configured to allow only one learned MAC address.

    E

    Port security interface counters need to be cleared before using the show command.

    F

    The port security configuration needs to be saved to NVRAM before it can become active.


    正确答案: E,B
    解析: 暂无解析

  • 第11题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following should you enable to prevent a switch from forwarding packets with source  addresses that are outside an administratively defined group? ()
    A

     DAI

    B

     STP

    C

     PVLAN

    D

     port security


    正确答案: D
    解析: 暂无解析

  • 第13题:

    You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()

    A. Telnet sessions from host A to host 5.1.1.10

    B. Telnet sessions from host A to host 5.1.3.10

    C. Telnet sessions from host B to host 5.1.2.10

    D. Telnet sessions from host B to host 5.1.3.8

    E. Telnet sessions from host C to host 5.1.3.10

    F. Telnet sessions from host F to host 5.1.1.10


    参考答案:D, F

  • 第14题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第15题:

    Why would a network administrator configure port security on a switch?()

    • A、To prevent unauthorized Telnet access to a switch port.
    • B、To limit the number of Layer 2 broadcasts on a particular switch port.
    • C、To prevent unauthorized hosts from accessing the LAN.
    • D、To protect the IP and MAC address of the switch and associated ports.
    • E、To block unauthorized access to the switch management interfaces over common TCP ports.

    正确答案:C

  • 第16题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第17题:

    An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()

    • A、255.0.0.0
    • B、255.255.0.0
    • C、255.255.252.0
    • D、255.255.255.0

    正确答案:C

  • 第18题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第19题:

    Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()

    • A、Port security needs to be globally enabled.
    • B、Port security needs to be enabled on the interface.
    • C、Port security needs to be configured to shut down the interface in the event of a violation.
    • D、Port security needs to be configured to allow only one learned MAC address.
    • E、Port security interface counters need to be cleared before using the show command.
    • F、The port security configuration needs to be saved to NVRAM before it can become active.

    正确答案:B,D

  • 第20题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    • A、IP addresses can be managed from a central point
    • B、Computers can automatically get new addressing when moved to a different network segment
    • C、Media Access Control addresses can be changed automatically
    • D、The network speed can automatically adjust based on the type of traffic being generated
    • E、The HOSTS file on the computer can be validated for proper entries

    正确答案:A,B

  • 第21题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Why would a network administrator configure port security on a switch()。
    A

    to prevent unauthorized Telnet access to a switch port

    B

    to limit the number of Layer 2 broadcasts on a particular switch port

    C

    to prevent unauthorized hosts from accessing the LAN

    D

    to protect the IP and MAC address of the switch and associated ports

    E

    to block unauthorized access to the switch management interfaces over common TCP ports


    正确答案: E
    解析: 暂无解析

  • 第23题:

    单选题
    Why would a network administrator configure port security on a switch?()
    A

    To prevent unauthorized Telnet access to a switch port.

    B

    To limit the number of Layer 2 broadcasts on a particular switch port.

    C

    To prevent unauthorized hosts from accessing the LAN.

    D

    To protect the IP and MAC address of the switch and associated ports.

    E

    To block unauthorized access to the switch management interfaces over common TCP ports.


    正确答案: D
    解析: 暂无解析