问答题

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.


您可能感兴趣的试卷

你可能感兴趣的试题

6.单项选择题

Study the exhibit carefully.

Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

A.Before MPLS is enabled, the ip cef command is only requited on routers 1 and 4
B.After MPLS is enabled, the ip cef command is only required on routers 1 and 4
C.Before MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
D.After MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
E.Before MPLS is enabled, the ip cef command must be applied to all provider routers

7.单项选择题

A new router was configured with the following commands:

The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

A.To prevent customers from running TDP with the ISP routers
B.To prevent customers from running LDP with the ISP routers
C.To prevent other ISPs from running LDP with the ISP routers
D.To prevent man-in-the-middle attacks
E.To use CBAC to shut down Distributed Denial of Service attacks
F.To use IPS to protect against session-replay attacks
G.None of the above

8.多项选择题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

A.IKE keepalives are unidirectional and sent every ten seconds
B.IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
C.To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
D.IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

最新试题

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

题型:问答题

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

题型:单项选择题

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

题型:问答题

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

题型:问答题

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

题型:问答题

Refer to the exhibit. Which two statements about the AAA configuration are true?()

题型:多项选择题

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

题型:单项选择题

Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

题型:单项选择题

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.

题型:问答题

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()

题型:单项选择题