- 积分
- 658
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 40
- 听众
- 收听
中级工程师
   
|
发表于 2016-6-3 08:56:50
|
显示全部楼层
Hi all,' x* {3 E8 k& _5 |+ a h$ _' P, P
4 B7 P' k4 M$ A7 G4 a4 b; K
Q23, E is correct ?! t- M: |+ g* u" {+ _5 i; [
/ \# {4 b" i+ a! J5 g' f
QUESTION NO: 23
( `5 W/ J. i. X) u; E0 [( {What technology can you implement on your network to allow Independent applications to work with IPv6-capable applications?! L; h4 ?% _0 w% g' H3 ?0 F, y
A. DS-Lite
9 C5 L5 S5 @# V+ a' UB. NAT-PT
) \# r! Q1 r: V% z) ~6 BC. ISATAP
9 }4 g, L. }- p# W" TD. NAT 6to4
" G2 }7 F& G8 gE. NAT649 `! D1 R2 G. _5 G4 T$ k
, D( H$ h* L/ _( {. h
Q26, seem only E is true, any suggestion.2 b3 P; _) _# F$ S4 k
6 U% S0 z1 ^! j$ ^( N& G4 m) H+ IQUESTION NO: 26
: x" t+ P; ~$ D8 O: MWhich two statements about 802.1x authentication with port security are true? (Choose two.)6 |6 C+ O1 W2 M; j
8 `" J9 W$ S9 g" ~A. If any client causes a security violation, the port is immediately placed in spanning-tree disabled mode.. K' ] D4 I* R; C; A
B. An entry is created in the secure host table for any client that is authenticated and manually configured for port security, even if the table is full.) Q6 p# I8 P9 `- J
C. 802.1x manages network access for all authorized MAC addresses.! z. t- V% y5 s, k( @
D. If a client is authenticated and the port security table is full, the oldest client is aged out.
) O1 Z, q# c2 K- tE. If any host causes a security violation, the port is immediately error-disabled.
. W+ R8 a t$ l) G6 L' g+ B |
11#
2016-6-3 08:56:50
回复(0)
收起回复
|