搜题
用户您好, 请在下方输入框内搜索其它题目:
搜题
题目内容 (请给出正确答案)
提问人:网友 发布时间:
【多选题】

The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()

A、Switch1(config-if)# switchport port-security maximum 1

B、Switch1(config)# mac-address-table secure

C、Switch1(config)# access-list 10 permit ip host

D、Switch1(config-if)# switchport p ort-security violation shutdown

E、Switch1(config-if)# ip access-group 10

更多“The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()”相关的问题
第1题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第2题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第3题

A、The network administrator can apply port security to dynamic access ports  B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.  C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.  D、The network administrator can apply port security to EtherChannels.  E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.  

点击查看答案
第4题

A、A. The Cisco Full-Service network foundation delivers a layered security approach that introduces interoperability issues  B、B. The Cisco Full-service Network Foundation Increases the support Cost  C、C. The Cisco Full-Service Network Foundation delivers a static single layer security approach that eliminates the interoperability issues  D、D. The Cisco Full-Service Network Foundation Delivers a layered security Approach that eliminates the interoperability issues  

点击查看答案
第5题

A、From Network Connections, right-click the active network connection, and then click Status.  B、From Network Connections, select the active network connection, and then click Diagnose this connection.  C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.  D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.  

点击查看答案
第6题

A、A.the use of hosted email services eliminating the need for local security  B、B.the perceived costs of security solutions  C、C.the lack of risk analysis  D、D.the lack of threats to their network  E、E.the belief that free security tools are sufficient  F、F.the desire to avoid unnecessary technologies  

点击查看答案
第7题

A、A.the desire to avoid unnecessary technologies  B、B.the belief that free security tools are sufficient  C、C.the perceived costs of security solutions  D、D.the use of hosted email services eliminating the need for local security  E、E.the lack of threats to their network  F、F.the lack of risk analysis  

点击查看答案
第9题

A、From the Local Security Policy console, configure the Security Options.  B、From the Local Security Policy console, configure the Application Control Policies.  C、From the Windows Firewall with Advanced Security console, create an inbound rule.  D、From the Windows Firewall with Advanced Security console, create a connection security rule.  

点击查看答案
第10题

A、A. Modify the local security policy on each file server.Define the size and retention settings for the Security event log.  B、B. Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.  C、C. Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.  D、D. Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.  

点击查看答案
客服
TOP

请使用微信扫码支付

订单号:
遇到问题请联系在线客服