Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet507/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   503   504   505   506   507   508   509   510   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

369

 100.  C.  The command 

ip access-list extended 

named_list will create an extended  

named access list. The command 

access-list 101 allow host 192.168.1.5 any is 

incorrect. The command 

ip access-list 

named_list is incorrect. The command  

ip access-list 101 

named_list is incorrect.



 101.  B.  Standard ACLs should always be placed closest to the destination of traffic since they 

are broad in the traffic they control. Extended ACLs should always be placed closest to the 

source of traffic since they are extremely granular. Dynamic ACLs can be placed in either 

location because they can be standard or extended access lists, with the addition of traffic-

based rules or time of day–based rules. An expanded ACL is not really a type of ACL; it 

specifies the expanded numbering for standard and extended ACLs.



 102.  A.  When you’re trying to diagnose port security, the first command should be 

show 


port-security. This will detail all of the ports with port security and their expected 

behavior when port security is violated. The command 

show mac address-table is 

incorrect. The command 

show interface is incorrect. The command show security is 

incorrect.



 103.  B.  Since the remote office has no onsite IT personnel, there is a risk of workers plugging in 

unauthorized equipment such as a WAP. If port security is implemented, the interface can 

be secured to allow only the MAC address of the computer to pass; all other traffic can be 

dropped. Dynamic VLANs will not prevent unauthorized equipment from being plugged 

into the network, such as a WAP. ACLs can mitigate what is accessible on servers but will 

not prevent unauthorized equipment from being plugged in. VLAN pruning is a good 

overall practice to minimize traffic across trunk links, but it does nothing for end device 

security.



 104.  B.  Port security can restrict a port to a single device by MAC address. This will effectively 

make plugging in a wireless access point (WAP) a non-event for a corporate network. 

Access control lists (ACLs) cannot restrict a wireless access point from being plugged 

into the corporate network. Wired Equivalent Privacy (WEP) is a very insecure wireless 

encryption protocol and will not prevent a wireless access point from being plugged into 

the corporate network. Static MAC addresses will not stop a wireless access point from 

being plugged into the corporate network.

 105.  A.  Port security blocks unauthorized access by examining the source address of a network 

device. The destination MAC address is used for forward filter decisions. The source and 

destination IP addresses are used by access control lists (ACLs) to filter traffic.

 106.  C.  Port security is enabled by configuring the command 

switchport port-security. 

This command must be configured on the interface in which you want to enable port 

security. The command 

switchport port-security is incorrect when it is configured 

in a global configuration prompt. The command 

port-security enable is incorrect 

regardless of where it is configured.





Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   503   504   505   506   507   508   509   510   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish