niusouti.com

单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign acces

题目
单选题
A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
A

Configure roles based on departments and assign access based on source IP address.

B

Configure roles based on the user's manager and assign access based on the user's MAC address

C

Configure roles based on group memberships and assign a specific VLAN to the role.

D

Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.


相似考题
更多“单选题A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()A Configure roles based on departments and assign acces”相关问题
  • 第1题:

    A network administrator needs to configure port security on a switch.which two statements are true? ()

    A.The network administrator can apply port security to dynamic access ports

    B.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.

    C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.

    D.The network administrator can apply port security to EtherChannels.

    E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.


    参考答案:C, E

  • 第2题:

    You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()

    • A、Upgrade the switches
    • B、Configure BPDU guard
    • C、Configure VLAN access lists
    • D、Configure port security
    • E、Configure Dynamic ARP inspection

    正确答案:D

  • 第3题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第4题:

    A WebSphere Commerce administrator is attempting to invalidate a cached servlet. Which course of action would NOT accomplish this goal?()

    • A、Manually Invalidate the servlet cache through the Cache Monitor
    • B、Configure a Time Based invalidation for the servlet
    • C、Call the dynamic cache invalidation API to invalidate the servlet
    • D、Manually invalidate the servlet through the Configuration Manager
    • E、Use the Commerce Accelerator to remove the invalid servlet

    正确答案:D,E

  • 第5题:

    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()

    • A、BPDU
    • B、Port security
    • C、RSTP
    • D、STP
    • E、VTP
    • F、Blocking mode

    正确答案:B

  • 第6题:

    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()

    • A、TACACS with LEAP extensions
    • B、RADIUS with EAP extensions
    • C、TACACS+
    • D、LDAP

    正确答案:B

  • 第7题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()

    • A、Default gateway
    • B、The ports on the switch
    • C、Port security on the server's switch port
    • D、Ethernet cable

    正确答案:A

  • 第8题:

    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()

    • A、Create a "Settings Update file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • B、Configure a wired adapter and assign the required SSID under "User Roles" > "Agent" > "Odyssey Settings".
    • C、Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".
    • D、Create a "Preconfiguration file" in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under "User Roles" > "Agent" > "Odyssey Settings" > "Preconfigured Installer".

    正确答案:A,B,D

  • 第9题:

    You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()

    • A、Users in both departments can access to their own files from the network.
    • B、Users in the Accounting department can view the Legal department’s documents.
    • C、Users in the Legal department cannot view the Accounting department’s documents.
    • D、Company managers can access and modify both departments’ files.

    正确答案:B,C,D

  • 第10题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()
    A

     Default gateway

    B

     The ports on the switch

    C

     Port security on the servers switch port

    D

     Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()
    A

    Configure roles based on departments and assign access based on source IP address.

    B

    Configure roles based on the user's manager and assign access based on the user's MAC address

    C

    Configure roles based on group memberships and assign a specific VLAN to the role.

    D

    Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()
    A

    Use any Windows 2000 to graphically access the HMC

    B

    Load, install, and configure WebSM on the workstation

    C

    Telnet to the HMC using Exceed or a GUI emulator product from the workstation

    D

    Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface


    正确答案: C
    解析: 暂无解析

  • 第13题:

    A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。

    A.Establish a direct link from the switch to all other switches in the network.

    B.Assign the switch a higher MAC address than the other switches in the network have.

    C.Configure the switch so that it has a lower priority than other switches in the network.

    D.Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.

    E.Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.


    参考答案:C

  • 第14题:

    Why would a network administrator configure port security on a switch?()

    • A、to prevent unauthorized Telnet access to a switch port
    • B、to limit the number of Layer 2 broadcasts on a particular switch port
    • C、to prevent unauthorized hosts from accessing the LAN
    • D、to protect the IP and MAC address of the switch and associated ports
    • E、to block unauthorized access to the switch management interfaces over common TCP ports

    正确答案:C

  • 第15题:

    You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()

    • A、Add a Network Adapter.
    • B、Add a Legacy Network Adapter.
    • C、Configure a static MAC address.
    • D、Configure a dynamic MAC address.

    正确答案:B

  • 第16题:

    A system administrator wants to configure 802.1X on an Ethernet switch to enable access to specific parts of the network based on group memberships.How can the administrator accomplish this goal?()

    • A、Configure roles based on departments and assign access based on source IP address.
    • B、Configure roles based on the user's manager and assign access based on the user's MAC address
    • C、Configure roles based on group memberships and assign a specific VLAN to the role.
    • D、Configure roles based on RADIUS request attribute and assign a specific VLAN to the role.

    正确答案:C

  • 第17题:

    The network administrator wants to enable an EtherChannel between two switches in "on" mode. The administrator connects the cables and enables the interfaces, but while configuring the EtherChannel in the first switch,a spanning-tree loop was detected. Which two of these procedures can avoid this problem?()

    • A、Configure the EtherChannel as "desirable" first.
    • B、Assign all interfaces to the same VLAN.
    • C、Disable PortFast on the interfaces in the EtherChannels.
    • D、Disable all interfaces first.
    • E、Fast Ethernet and Gigabit Ethernet ports cannot be assigned to the same EtherChannel.
    • F、Fix cabling problems.

    正确答案:A,D

  • 第18题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()

    • A、 Default gateway
    • B、 The ports on the switch
    • C、 Port security on the servers switch port
    • D、 Ethernet cable

    正确答案:A

  • 第19题:

    A system administrator wants to control the HMC from their workstation. Microsoft Windows 2000 is running and the HMC graphical user interface is being used remotely. Which of the following actions will accomplish this task?()

    • A、Use any Windows 2000 to graphically access the HMC
    • B、Load, install, and configure WebSM on the workstation
    • C、Telnet to the HMC using Exceed or a GUI emulator product from the workstation
    • D、Load, install, and configure OpenSSH or SSH on the workstation and access the HMC through the GUI interface

    正确答案:B

  • 第20题:

    You are the network administrator for The network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all client computers run Windows XP Professional. You create and share a folder named Sales on a member server. You apply the default share permission and NTFS permissions to Sales. Then you create a folder named SalesForecast in Sales. You apply the default NTFS permissions to SalesForecast. Managers in the sales department are members of a domain user group named SalesManagers. When members of SalesManagers try to add files to SalesForecast,they receive the "Access is denied" error message. You need to configure permissions on these folders to fulfil the following requirements: 1. Members of SalesManagers must be able to create, modify, and delete files in both folders. 2. All other domain users must only be able to read files in both folders. What should you do?()

    • A、Configure the share permissions on Sales to assign the Allow - Change permission to the Everyone group. Configure the NTSF permissions on SalesForecast to assign the Allow - Write permission to the SalesManagers group.
    • B、Configure the share permissions on Sales to assign the Allow - Change permissions to the SalesManagers group. Configure the NTSF permissions on Sales to assign the Allow - Write permissions to the SalesManagers group.
    • C、Configure the share permissions on Sales to assign the Allow - Change permissions to the Everyone group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.
    • D、Configure the share permissions on Sales to assign theAllow - Change permission to the SalesManagers group. Configure the NTFS permissions on Sales to assign the Allow - Modify permission to the SalesManagers group.

    正确答案:D

  • 第21题:

    单选题
    You work as a network administrator at, You have been asked to configure 802.1x port-based authentication. You notice that the client workstation is not compatible with 802.1x port-based authentication.  What supported authentication server should be chosen?()
    A

    TACACS with LEAP extensions

    B

    RADIUS with EAP extensions

    C

    TACACS+

    D

    LDAP


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
    A

    BPDU

    B

    Port security

    C

    RSTP

    D

    STP

    E

    VTP

    F

    Blocking mode


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    You have three classes of users on your network: employee, contractor, and IT administrator. You configure the Junos Pulse Access Control Service to assign roles to each user class and require that a specific wireless SSID be preconfigured for the Odyssey Access Client based on the role. Which configuration method should you use to satisfy this scenario?()
    A

    Create a Settings Update file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    B

    Configure a wired adapter and assign the required SSID under User Roles > Agent > Odyssey Settings.

    C

    Create a script in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.

    D

    Create a Preconfiguration file in the Odyssey Access Client Administrator and upload it to the Junos Pulse Access Control Service under User Roles > Agent > Odyssey Settings > Preconfigured Installer.


    正确答案: C,A
    解析: 暂无解析

  • 第24题:

    单选题
    You are a network administrator for your company. The network consists of two Active Directory domains. You are responsible for administering one domain, which contains users who work in the sales department. User objects for the users in the sales department are stored in an organizational unit (OU) named Sales in your domain.   Users in the sales department use a public key infrastructure (PKI) enabled application that requires users to present client authentication certificates before they are granted access. You install Certificate Services on two member servers  running Windows Server 2003. You configure one server as an enterprise subordinate certification authority (CA) and the other server as a stand-alone root CA.   You need to issue certificates that support client authentication to sales users only. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()
    A

     Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll users for certificates.

    B

     Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Configure the Default Domain Policy Group Policy object (GPO) to autoenroll computers for certificates.

    C

     Create a duplicate of the User certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales users for certificates.

    D

     Create a duplicate of the Computer certificate template and configure it to support autoenrollment. Configure the enterprise subordinate CA to issue certificates based on the template. Create a new Group Policy object (GPO) and link it to the Sales OU. Configure the GPO to autoenroll sales client computers for certificates.


    正确答案: B
    解析: 暂无解析