6.5.8
You want to increaseThe security of your network by allowing on the authenticated users to access network devices through a switch. which of the following should you implement?
802.1x
You are the network on the street her for a city library. Throughout the library are several groups of computers that provide public access to the Internet. Supervision of this computers has been difficult. You have had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect your laptop to the Internet. What can you do?
Configure port security on the switch
Which of the following applications typically used 802.1X authentication?
Controlling access through a switch Controlling access through a wireless point
Which of the following best describes the concept of virtual LAN?
Devices on the same network logically grouped as if they were on separate networks
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. you want to make sure that visitors cannot plug in their computers to the free network jacks and the connector to the network. However, employees who plug-in the same jacks should be able to connect to the network. What features should you configure?
Port authentication
Do you manage a small network that uses multiple switches. Do you want to provide multiple paths between switches so that if the link goes down, an alternate part is available. Which feature should your switch support?
Spanning three
Which of the following solutions Would you implement to eliminate switching loops?
Spanning tree
You manage a single subnet with three switches. The switches are connected to provide redundant ports between the switches. Which feature prevents switch in loops and ensures there's only a single active path between the two switches?
Spanning tree
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
Switch port
When configuring VLANs on a switch, what type of switch ports are members of all the VLANs defined on the switch?
Trunk ports
Do you run a small network for your business that has a single router connected to the Internet any single switch. You keep sensitive documents on the computer that you would like to keep isolated from the other computers on the network. Other hosts on the network should not be able to communicate with his computer through switch, but you still need to access the network through the computer. Washer use for the situation?
VLAN
Your company is a small start up company that has leased office space in the building shared by other businesses. All businesses Sherry, network infrastructure. He single switch connects all devices in the building to the powder that provides Internet access. You would like to make sure that your computer or ice so late it from the computer is used by other companies. Which features should you request to have implemented?
VLAN
You managing network that uses a single switch. All porch within your building connect three single switch. In the lobby of your building there are 3RJ Dash 45 ports connected to the switch. Do you want to allow visitors to plug-in to the sport to gain Internet access, but they should have no access to any other devices in your private network. Employees connected through out the rest of the building should have both private and Internet access. Which future should you implement?
Vlans
In which of the following situations would you used port security?
You want to restrict the devices that could connect through switch port.
A virtual LAN can be created using which of the following?
switch