首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
admin
2009-05-19
24
问题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
选项
答案
B
解析
Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.
When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.
The port’s behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.
转载请注明原文地址:https://kaotiyun.com/show/UShZ777K
本试题收录于:
思科640802题库思科认证分类
0
思科640802
思科认证
相关试题推荐
Asmanypeoplehitmiddleage,theyoftenstarttonoticethattheirmemoryandmentalclarityarenotwhattheyusedtobe.We
Itwassupposedtobethenew-mediaelection.E-mail,blogging,socialnetworkingandtweetingwereexpectedtosurgeinimporta
在“受信任的站点”区域上添加www.sina.com。
向bob发送消息“今天晚上六点在九品香饭店吃饭”。
从“系统属性”出发安装网卡驱动程序。
将IE的Inte~net高级选项,设置成“关闭浏览器时清空Internet临时文件”。
在【安全中心】窗口中,设置windows防火墙的日志记录成功的连接。
计算机的硬件系统由五大部分组成,其中()是整个计算机的指挥中心。A.运算器B.控制器C.接口电路D.系统总线k
经常感染Office系列文件,然后通过Office通用模板进行传播的病毒一般为()。
CUWN体系结构中包括多少个元素?A、5B、10C、15D、20
随机试题
乳腺癌术后辅助化疗的指征不包括
在一定时期内,患某种疾病的人群中因该病而死亡的频率称为
A.病起发热,皮肤干燥,咳呛少痰B.肢体困重,手足麻木,喜凉恶热C.神疲肢倦,肌肉萎缩,少气懒言D.腰膝酸软,眩晕耳鸣,舌咽干燥E.手足麻木不仁,四肢青筋显露,舌痿不能伸缩
下列关于国外建筑安装工程费用的构成中,属于各分部分项工程费用的材料费的是()。
下列属于人员密集场所特点的是()。
商业银行以负债经营为特色,其资本所占比重较低,融资杠杆率很高,因此承担着巨大风险。()
()是质量管理体系过程的终点,也是一个新的质量管理体系过程的起点。
下列选项中,表述正确的是()。
甲携带凶器拦路抢劫,黑夜中遇到乙便实施暴力。乙发现是自己的熟人甲,便喊甲的名字,甲一听便住手,还向乙道歉说:“对不起,认错人了。”甲的行为属于下列哪一种情形?()
ThemediamadeabigdealofthefactthattheDJIAroseabove9,000forthefirsttimeinnearlyeightmonths.Theindex(anumb
最新回复
(
0
)