多項選擇題

Refer to the exhibit. Which two statements about the SDF Locations window of the IPS Rule wizard are true?()

A.An HTTP SDF file location can be specified by clicking the Add button.
B.If all specified SDF locations fail to load, the signature file that is named default.sdf will be loaded.
C.The Autosave feature automatically saves the SDF alarms if the router crashes.
D.The Autosave feature is automatically enabled for the default built-in signature file.
E.The name of the built-in signature file is default.sdf.
F.The Use Built-In Signatures (as backup) check box is selected by default.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題What are three features of the Cisco IOS Firewall feature set?()

A.network-based application recognition (NBAR)
B.authentication proxy
C.stateful packet filtering
D.AAA services
E.proxy server
F.IPS

2.多項選擇題Which two statements are true about broadband cable (HFC) systems?()

A.Cable modems only operate at Layer 1 of the OSI model.
B.Cable modems operate at Layers 1 and 2 of the OSI model.
C.Cable modems operate at Layers 1, 2, and 3 of the OSI model.
D.A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.
E.A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.

3.單項選擇題

Refer to the exhibit. MPLS has been configured on all routers in the domain. In order for R2 and R3 to forward frames between them with label headers, what additional configuration will be required on devices that are attached to the LAN segment?()

A.Decrease the maximum MTU requirements on all router interfaces that are attached to the LAN segment.
B.Increase the maximum MTU requirements on all router interfaces that are attached to the LAN segment.
C.No additional configuration is required. Interface MTU size will be automatically adjusted to accommodate the larger size frames.
D.No additional configuration is required. Frames with larger MTU size will be automatically fragmented and forwarded on all LAN segments.

5.單項選擇題What is a reason for implementing MPLS in a network?()

A.MPLS eliminates the need of an IGP in the core.
B.MPLS reduces the required number of BGP-enabled devices in the core.
C.Reduces routing table lookup since only the MPLS core routers perform routing table lookups.
D.MPLS eliminates the need for fully meshed connections between BGP enabled devices.

6.單項選擇題During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process

7.單項選擇題Which statement is true about a worm attack?()

A.Human interaction is required to facilitate the spread.
B.The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
C.Extremely large volumes of requests are sent over a network or over the Internet.
D.Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

8.多項選擇題What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()

A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction

9.多項選擇題Which two statements about the Cisco AutoSecure feature are true?()

A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.

10.多項選擇題What are two steps that must be taken when mitigating a worm attack?()

A.Inoculate systems by applying update patches. 
B.Limit traffic rate. 
C.Apply authentication. 
D.Quarantine infected machines. 
E.Enable anti-spoof measures.

最新試題

Refer to the exhibit.What are the two options that are used to provide High Availability IPsec?()

題型:多項選擇題

Which three statements about IOS Firewall configurations are true?()

題型:多項選擇題

Which two statements are true about broadband cable (HFC) systems?()

題型:多項選擇題

Which statement describes Reverse Route Injection (RRI)?()

題型:單項選擇題

When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()

題型:單項選擇題

Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()

題型:單項選擇題

Which form of DSL technology is typically used as a replacement for T1 lines?()

題型:單項選擇題

Refer to the exhibit.What does the "26" in the first two hop outputs indicate?()

題型:單項選擇題

Refer to the exhibit. What type of security solution will be provided for the inside network?()

題型:單項選擇題

Refer to the exhibit. The show mpls interfaces detail command has been used to display information about the interfaces on router R1 that have been configured for label switching. Which statement is true about the MPLS edge router R1?()

題型:單項選擇題