問答題

Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.


您可能感興趣的試卷

你可能感興趣的試題

3.單項選擇題

Study the exhibit carefully.

Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()

A.Before MPLS is enabled, the ip cef command is only requited on routers 1 and 4
B.After MPLS is enabled, the ip cef command is only required on routers 1 and 4
C.Before MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
D.After MPLS is enabled, the ip cef command is only required on the Ethernet 0 interfaces ofrouters 1 and 4
E.Before MPLS is enabled, the ip cef command must be applied to all provider routers

4.單項選擇題

A new router was configured with the following commands:

The configuration above was found on an Internet Service Provider’s (ISP) Multiprotocol LabelSwitching (MPLS) network. What is its purpose?()

A.To prevent customers from running TDP with the ISP routers
B.To prevent customers from running LDP with the ISP routers
C.To prevent other ISPs from running LDP with the ISP routers
D.To prevent man-in-the-middle attacks
E.To use CBAC to shut down Distributed Denial of Service attacks
F.To use IPS to protect against session-replay attacks
G.None of the above

5.多項選擇題IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()

A.IKE keepalives are unidirectional and sent every ten seconds
B.IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keys
C.To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepackets
D.IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers

最新試題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項選擇題

Study this exhibit carefully. What information can be derived from the SDM firewall configurationdisplayed?()

題型:單項選擇題

Drag and drop the steps in the process for provisioning a cable modem to connect to a headendon the above to the below in the order defined by the DOCSIS standard.

題型:問答題

Drag the IPsec protocol description from the above to the correct protocol type on the below.(Notall descriptions will be used)Drag and Drop question, drag each item to its proper location.

題型:問答題

Drag the IOS commands from the left that would be used to implement a GRE tunnel using the10.1.1.0.30 network on interface serial 0/0 to the correct target area on the right.

題型:問答題

Router NetworkTut is configured as shown below:Given the above configuration, which statement is true?()

題型:單項選擇題

Drag the protocols that are used to distribute MPLS labels from the above to the target area on thebelow.(Not all options will be used)

題型:問答題

As a network technician, do you know what is a recommended practice for secure configurationmanagement?()

題型:單項選擇題

Drag and drop the xDSL type on the above to the appropriate xDSL description on the below.

題型:問答題

Which statement about PPPoA configuration is correct?()

題型:單項選擇題