2

You are network administrator, in order to improve the security of switching network, refer to the following options. Which two methods are examples of implementing Layer 2 security on a Cisco switch? ( Choose two)
A. disable trunk negotiation on the switch.
B. use only protected Telnet sessions to connect to the Cisco device.
C. configure a switch port host where appropriate.
D. enable HTTP access to the switch for security troubleshooting.


Correct A, C
Explaination :
With the popularity and constantly deepening of network applications, the users? Requirements for 2 Layer 2 switches are not only limited to data forwarding performance and quality of service (QoS), but also philosophy of network security which is becoming an increasingly an important consideration of networking products. How to filter user communications and ensure safe and effective data transmission? How to block the illegal users and make network work safely? How to execute secure network management and detect illegal users, illegal activities and security performance of remote network management information in time? The following methods can accomplish network Layer 2 security by working on switches.


Tips and Trik CCNA

Posted by JUPITER Thursday, November 25, 2010

0 comments

Post a Comment

Subscribe here