首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent w
admin
2009-05-19
38
问题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
选项
答案
B
解析
Explanation:
Understanding How Port Security Works:
You can use port security to block input to an Ethernet, Fast Ethernet, or Gigabit Ethernet port when the MAC address of the station attempting to access the port is different from any of the MAC addresses specified for that port. Alternatively, you can use port security to filter traffic destined to or received from a specific host based on the host MAC address.
When a secure port receives a packet, the source MAC address of the packet is compared to the list of secure source addresses that were manually configured or autoconfigured (learned) on the port. If a MAC address of a device attached to the port differs from the list of secure addresses, the port either shuts down permanently (default mode), shuts down for the time you have specified, or drops incoming packets from the insecure host.
The port’s behavior depends on how you configure it to respond to a security violation. If a security violation occurs, the Link LED for that port turns orange, and a link-down trap is sent to the Simple Network Management Protocol (SNMP) manager. An SNMP trap is not sent if you configure the port for restrictive violation mode. A trap is sent only if you configure the port to shut down during a security violation.
转载请注明原文地址:https://kaotiyun.com/show/UShZ777K
本试题收录于:
思科640802题库思科认证分类
0
思科640802
思科认证
相关试题推荐
Inthissection,youareaskedtowriteanessaybasedonthefollowinginformation.Makecommentsandexpressyourownopinion.
Herearesomemanagementtoolsthatcanbeusedtohelpyouleadapurposefullife.1.UseYourResourcesWisely.Yourdecisi
值类型和引用类型的区别?写出C#的样例代码。
输入一颗二元查找树,将该树转换为它的镜像,即在转换后的二元查找树中,左子树的结点都大于右子树的结点。用递归和循环两种方法完成树的镜像转换。例如输入:定义二元查找树的结点为:structBSTreeNode//anodeinthebi
在Google搜索中利用数学公式,pi*5^2的值。
在Internet选项中删除Cookies。
设置TCP/IP属性由DHCP服务器负责分配IP地址。
利用MSN给bob@sina.com发送电子邮件内容“8号晚上到我家一起吃饭”。
到北京大学FTP站点的上传。
将远程服务器中名为“apple”的文件移动到名为“2.10”的文件夹中,并打开【2.10】文件夹。
随机试题
资本金一次性筹集期限为12个月(签发营业执照之日起)。()
和平共处的五项原则的倡导国是()。
妊娠合并阑尾炎的临床特点描述正确的是:
不属于青少年心理健康教育的主要内容是()
退伙人对其退伙前已经发生的债务( )。
张某从甲银行分支机构乙支行借款20万元,李某提供保证担保。李某和甲银行又特别约定,如保证人不履行保证责任,债权人有权直接从保证人在甲银行及其支行处开立的任何账户内扣收。届期,张某、李某均未还款,甲银行直接从李某在甲银行下属的丙支行账户内扣划了18万元存款用
甲公司以10万元的价格向乙公司购买10吨食用油,约定8月1日乙公司将该批食用油运到甲公司。甲公司向乙公司支付定金2.5万元。同时约定,一方违约应支付给对方违约金3万元。合同履行期限将至,由于粮油市场的价格有大幅度上调,乙公司认为与甲公司约定的价格过低,遂与
通过对教学经验的反思,波斯纳提出了一个教师成长公式:________。
少制造垃圾和污水及公交出行等,当然是更环保、更文明的生活方式,没有人会反对。但人的行为有另一套逻辑,政府再怎么大张旗鼓宣传,环保人士再怎么身体力行,也不如请来价格机制的大神,让人的自利行为与环保目标有效匹配起来。在此基础上,社会舆论和社会组织就可以锦上添花
通过刺激反应一致性冲突实验可以证明的效应是()。
最新回复
(
0
)