多項(xiàng)選擇題What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()

A.reset the connection
B.forward the packet
C.check the packet against an ACL
D.drop the packet


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which statement describes Reverse Route Injection (RRI)?()

A.A static route that points towards the Cisco Easy VPN server is created on the remote client.
B.A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
C.A default route is injected into the route table of the remote client.
D.A default route is injected into the route table of the Cisco Easy VPN server.

2.多項(xiàng)選擇題Which three techniques should be used to secure management protocols?()

A.Configure SNMP with only read-only community strings.
B.Encrypt TFTP and syslog traffic in an IPSec tunnel.
C.Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.
D.Synchronize the NTP master clock with an Internet atomic clock.
E.Use SNMP version 2.
F.Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.

3.多項(xiàng)選擇題If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()

A.A received IP packet is forwarded based on the IP destination address and the packet is sent as an IP packet.
B.An IP destination exists in the IP forwarding table. A received labeled packet is dropped because the label is not found in the LFIB table.
C.There is an MPLS label-switched path toward the destination. A received IP packet is dropped because the destination is not found in the IP forwarding table.
D.A received IP packet is forwarded based on the IP destination address and the packet is sent as a labeled packet.
E.A received labeled IP packet is forwarded based upon both the label and the IP address.
F.A received labeled packet is forwarded based on the label. After the label is swapped,the newly labeled packet is sent.

4.單項(xiàng)選擇題What are the four steps, in their correct order, to mitigate a worm attack?()

A.contain,inoculate,quarantine,and treat
B.inoculate,contain,quarantine,and treat
C.quarantine,contain,inoculate,and treat
D.preparation,identification,traceback,and postmortem
E.preparation,classification,reaction,and treat
F.identification,inoculation,postmortem,and reaction

5.多項(xiàng)選擇題Which two network attack statements are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
C.DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
D.DoS attacks can consist of IP spoofing and DDoS attacks.
E.IP spoofing can be reduced through the use of policy-based routing.
F.IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

最新試題

Which three MPLS statements are true?()

題型:多項(xiàng)選擇題

Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()

題型:多項(xiàng)選擇題

Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()

題型:單項(xiàng)選擇題

Refer to the exhibit. The show mpls interfaces detail command has been used to display information about the interfaces on router R1 that have been configured for label switching. Which statement is true about the MPLS edge router R1?()

題型:單項(xiàng)選擇題

Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()

題型:單項(xiàng)選擇題

Which statement about an IPS is true?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()

題型:單項(xiàng)選擇題

During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

題型:單項(xiàng)選擇題

What are the four fields in an MPLS label?()

題型:多項(xiàng)選擇題

Which statement is true about a worm attack?()

題型:單項(xiàng)選擇題