Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
您可能感興趣的試卷
你可能感興趣的試題
Study the exhibit carefully.
Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
A.Before MPLS is enabled, the ip cef command is only requited on routers 1 and 4
B.After MPLS is enabled, the ip cef command is only required on routers 1 and 4
C.Before MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
D.After MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
E.Before MPLS is enabled, the ip cef command must be applied to all provider routers
A new router was configured with the following commands:
The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()
A.To prevent customers from running TDP with the ISP routers
B.To prevent customers from running LDP with the ISP routers
C.To prevent other ISPs from running LDP with the ISP routers
D.To prevent man-in-the-middle attacks
E.To use CBAC to shut down Distributed Denial of Service attacks
F.To use IPS to protect against session-replay attacks
G.None of the above
A.IKE keepalives are unidirectional and sent every ten seconds
B.IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
C.To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
D.IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
最新試題
Refer to the exhibit. Which two statements about the AAA configuration are true?()
Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()
Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.
Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.
Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.
Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()
Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)
As a network technician, do you know what is a recommended practice for secure configurationmanagement?()
Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.
Which statement about PPPoA configuration is correct?()