首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
admin
2009-05-19
23
问题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
选项
答案
B
解析
Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.
When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.
The port’s behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.
转载请注明原文地址:https://jikaoti.com/ti/NCO7FFFM
本试题收录于:
思科640802题库思科认证分类
0
思科640802
思科认证
相关试题推荐
Writeanessayof160-200wordsbasedonthefollowingtable.Youressayshould1.describethechangesintheaveragefamilyex
Ifyou’reinahospitalandyourdoctorwantstomonitoryouwithoutbeingintheroom,there’sanappforthat.Therearealso
在Google搜索中利用数学公式,pi*5^2的值。
添加一个新的类型是计算机管理员的用户John
设置拨号连接属性启动“Microsoft网络客户端”组件。
设置CuteFTP在启动时加载站点管理器,在连接不通的情况下重连接的次数不超过8次。
从当前界面开始,在【资源管理器】窗口中,使用右键方式设置本地驱动器C为共享方式。
利用"资源管理器"对可移动磁盘E盘进行扫描并恢复被损坏的扇区。
规划模式可产生地图上放置的理论AP热点地图。接着热点地图会生成什么?A、新地图B、所用设备汇总C、设备需求和位置部署的建议D、WCS中的日志消息
要确定媒介是否被使用,应使用下列哪项?(选择所有正确答案)A、CCAB、CASC、VCAD、VCS
随机试题
网上的每台计算机、路由器等都要有一个唯一可标识的地址,在Internet上为每个计算机指定的唯一的32个二进制位的地址称为(),也称为网际地址。
Boththesestarsdon’tonlytalkaboutwhattheywouldliketodo—(theyactuallydowhattheybelievein).
在贝塔系数中,当投资组合的价格变动幅度与市场一致时,贝塔系数()。
证券投资基金的基金规模越大,风险越小,管理费用就()。
某企业出售—台设备(不考虑相关税费),原价160000元,已提折旧45000元,出售设备时发生各种清理费用3000元,出售设备所得价款113000元。该设备出售净收益为()元。
重庆市石柱土家族自治县被誉为()。
生产损失事故是一种损失较大的事故,例如,电力生产单位的停电事故所造成的损失既有电力企业未能出售电力的损失,也有用电部门停产的损失。所以对于产供销一体化的生产企业而言,生产损失经常是________。
3年前爷爷的年龄是小明年龄的4倍,5年后爷爷的年龄是小明年龄的3倍,求爷爷今年的年龄是多少岁?()
Evidenceofthebenefitsthatvolunteeringcanbringolderpeoplecontinuestorollin."Volunteershaveimprovedphysicalands
"Home,sweethome"isaphrasethatexpressesanessentialattitudeintheUnitedStates.Whethertherealityoflifeinthefam
最新回复
(
0
)