Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
您可能感兴趣的试卷
你可能感兴趣的试题
Study the exhibit carefully.
Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
A.Before MPLS is enabled, the ip cef command is only requited on routers 1 and 4
B.After MPLS is enabled, the ip cef command is only required on routers 1 and 4
C.Before MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
D.After MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
E.Before MPLS is enabled, the ip cef command must be applied to all provider routers
A new router was configured with the following commands:
The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
A.To prevent customers from running TDP with the ISP routers
B.To prevent customers from running LDP with the ISP routers
C.To prevent other ISPs from running LDP with the ISP routers
D.To prevent man-in-the-middle attacks
E.To use CBAC to shut down Distributed Denial of Service attacks
F.To use IPS to protect against session-replay attacks
G.None of the above
A.IKE keepalives are unidirectional and sent every ten seconds
B.IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
C.To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
D.IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()
A.HSRP
B.Dual Router Mode (DRM) IPsec
C.IPsec Backup Peerings
D.RRI
IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps tosetup an IPsec VPN?()
A.A
B.B
C.C
D.D
最新试题
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()