單項選擇題

Exhibit:

You work as a network administrator at.You study the exhibit carefully. Three different wireless groups of users (support, staff, guests) are permitted to access the wireless LAN. 
Which security policy should be implemented for the users in the guests group? ()

A.LEAP authentication
B.Primary SSID with open or no WEP authentication
C.Static WEP and authentication
D.Open authentication with WEP plus MAC authentication


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題

You work as a network engineer for . You study the switch exhibit carefully. 
Which two statements are true? ()
Exhibit:

A.The trust boundary is not on this switch.
B.It is displaying the AutoQos configuration that was initially applied.
C.Interface Fa0/3 trusts allCoS values.
D.The switch does not trust theCoS values of a Cisco IP phone attached to port Fa0/3.
E.The show auto qos command shows the user-defined QoS settings.
F.The show auto qos command does not display user configuration changes currently in effect.

3.多項選擇題Which three statements are true about DAI?()

A.DAI intercept all ARP packets on untrusted ports
B.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
C.DAI is used to prevent against a DHCP Snooping attack.
D.DAI forwards all ARP packets received on a trusted interface without any checks.
E.DAI forwards all ARP packets on untrusted ports.
F.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

4.多項選擇題Which two statements are true about trust boundaries?()

A.Classifying and marking traffic should be done as close to the traffic source as possible. 
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.

5.單項選擇題

Refer to the exhibit. 
What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()

A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1.

最新試題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()

題型:單項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:單項選擇題

Which two statements are true when the extended system ID feature is enabled? ()

題型:多項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:單項選擇題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題