首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
admin
2009-05-19
20
问题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
选项
答案
B
解析
Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.
When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.
The port’s behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.
转载请注明原文地址:https://jikaoti.com/ti/NCO7FFFM
本试题收录于:
思科640802题库思科认证分类
0
思科640802
思科认证
相关试题推荐
BarackObamaspentmuchtimeonthecampaigntrailproposingadramaticvisiontochangenotonlytheUnitedStatesforthebett
输入一棵二元查找树,将该二元查找树转换成一个排序的双向链表。要求不能创建任何新的结点,只调整指针的指向。 比如将二元查找树转换成双向链表4=6=8=10=12=14=16。
实现strstr功能(寻找子串在父串中首次出现的位置)
在Interenet选项中删除IE临时文件夹的所有内容,并删除所有脱机内容。
添加新联系人,姓名为:王龙;邮件地址为:wanglong@lnu.edu.cn。
利用"开始"菜单的"运行"选项,启动"计算器"应用程序,计算器应用程序的标识为:c:\windows\system32\calc.exe(在"打开"中直接填写标识名)。
创建一个新用户名称为XXX,账户类型为"受限"。
调整当前图标系列的次序为:马宇、杜青、赵刚、孙晓晓、赵刚。
ZigBee用于哪种常见部署?(选择所有正确答案)A、家庭自动化B、监控C、GPS定位D、控制系统
随机试题
根据消费税法律制度规定,纳税人自产自用的应税消费品不缴纳消费税的是()
下列关于体温的叙述,错误的是
以下属于运动员禁忌的药物是
患者,男,34岁,高热,右上腹疼痛5天,B超提示肝脓肿,曾有胆道感染病史。此患者的饮食指导正确的是
依据《消防法》的规定,火灾扑灭后,为隐瞒、掩饰起火原因,推卸责任,故意破坏现场或者伪造现场,尚不构成犯罪的,可以给予的行政处罚包括()。
大型储罐罐底焊缝的致密性,应采用()方法进行检查。
城市公共活动中心的空间组织原则,下述哪些是对的?()Ⅰ-运用轴线把中心不同部分连成一个整体Ⅱ-统一考虑各空间之间的环境协调Ⅲ-首先应考虑中心建筑空间和面貌的塑造,满足审美要求Ⅳ-尊重历史上已形成的重要建筑格局
影响社会政策实施的主要因素不包括()。
求真务实不可能一蹴而就,一劳永逸。彼时的“真”不能代替此时的“真”,彼时的“实”不能代替此时的“实”。这段话强调了()。
徐霞客出生在一个富庶之家。受父亲影响,他喜爱读地理、探险和游记之类的书籍。这些书籍使他从小就热爱祖国的壮丽河山,立志要遍游名山大川。22岁时徐霞客开始外出旅游。徐霞客一生游历中国30多年,广泛记录了自己的旅行。为了进行细致的考察,他很少乘车坐船,几乎全靠双
最新回复
(
0
)