Quản trị mạng CCNP.Sem9.Security

5 285 0
Tài liệu đã được kiểm tra trùng lặp
Quản trị mạng  CCNP.Sem9.Security

Đang tải... (xem toàn văn)

Thông tin tài liệu

Quản trị mạng

Nguyen Khac Quyet - Take Exam Exam questions Time remaining: 00: 48: 25 1 . Which of the following four (out of a total of nine) RFC 1757 RMON groups are supported by Cisco switches? Statistics Group History Group Logging Group Social Group Alarm Group Event Group 2 . Which two are characteristics of extended access lists? May filter traffic based on the protocol type May filter traffic based only on the source address May not filter traffic based on the source address May filter traffic based on the destination address 3 . TACACS+ uses which of the following protocols to communicate ? UDP CDP TCP DES 4 . What are two switches that support redundant supervisor engines? 4000 5500 6000 12000 5 . When using access lists, what does a Cisco router check first? The packet contents The destination address The source address To see if the packet is routable or bridgeable 6 . Which of the following provides a GUI-based management interface for Cisco switches? VlanDirector TrafficDirector CRM CSWI 7 . Access lists are numbered. Which of the following ranges could be used for an IP access list? Choose two. 600-699 100-199 1-99 800-899 1000-1099 8 . What are the two things you must do to activate an access list? Set up the access list with the command and parameters First shutdown the interface that the access list will be applied to Apply the access list as part of a group on an interface Use the access-list command to apply the access list to the interface 9 . What is the purpose of Switched Port Analyzer (SPAN) on a Catalyst 5000? Shows the module of where the SPAN port is located Shows the module of where the VLAN identifier is located The VLAN that is providing the source frames duplicates the frames The flow of data from a source and destination port is mirrored to the port designated at the SPAN port using a Protocol Analyzer 10 . Read and answer the question A B C D 11 . What feature must you have to access additional RMON groups? Spanning Tree SPAN RMON8 CWSI 12 . Which statement describes a feature of a Switch Port Analyzer (SPAN) session? Affects switching traffic on source ports. Associates a source interface with multiple destination interfaces. Eliminates multiple copies of packets. Associates multiple source interfaces with a single destination interface. 13 . What are the two types of access lists that can be configured on a Cisco router? Choose two. Standard Packet Filtering Extended 14 . Which of the following is a characteristic of port security? Port security is meant to be configured on trunk ports Limits the MAC addresses that are allowed to use the switch to prevent unauthorized users from gaining access to the network When using EtherChannels, it is highly recommended that you do not disable port security Port security limits the IP addresses that are allowed to use the switch 15 . What applications are included with CWSI (CiscoWorks for Switched Internetworks)? Choose five. CiscoView CLI VLANDirector Traffic Director STP ATMDirector ResourceManager TACACS+ 16 . Which Cisco management product would you choose to manage Cisco switches? TrafficDirector CWSI MRTG Scion 17 . In order to limit the quantity of numbers that a system administrator has to enter on an access-list, Cisco can use which abbreviation to indicate 0.0.0.0? host any all include 18 . When using a Switched Port Analyzer (SPAN) on a Catalyst 5000, what is identified by the destination module (port identifier)? The module of where the SPAN port is located The module of where the VLAN identifier is located The VLAN that is providing the source frames The source and destination trunk port 19 . Read and answer the question A B C D 20 . What four groups in the RMON specification (RFC 1757) does the Catalyst 5000 embedded RMON agent support? Statistics Group Supervisor Group History Group Alarms Group Events Group Showing page 1 of 1 : 1Go! © 2004 HanoiCTT. All rights reserved. . Filtering Extended 14 . Which of the following is a characteristic of port security? Port security is meant to be configured on trunk ports Limits the MAC addresses. EtherChannels, it is highly recommended that you do not disable port security Port security limits the IP addresses that are allowed to use the switch

Ngày đăng: 13/11/2012, 17:19

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan