CCNA系列认证

单选题What are PAC files used for?()Aexplicit forward mode proxy deploymentsBL4TMCtransparent mode proxy deploymentsDuser agent-based policies

题目
单选题
What are PAC files used for?()
A

 explicit forward mode proxy deployments

B

 L4TM

C

 transparent mode proxy deployments

D

 user agent-based policies

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration?()

A. A switch in the VTP client mode cannot update its local VLAN database.

B. A trunk link must be configured between the switches to forward VTP updates.

C. A switch in the VTP server mode can update a switch in the VTP transparent mode.

D. A switch in the VTP transparent mode will forward updates that it receives to other switches.

E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number.

F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership.


参考答案:A, B, D

第2题:

Which statement about the S-Series native FTP proxy is not true?() 

  • A、 both active and passive modes FTP are supported
  • B、 by default the FTP proxy uses port 8021
  • C、 access polices may apply to native FTP traffic
  • D、 data loss prevention policies may apply to native FTP traffic
  • E、 authentication is supported in transparent mode

正确答案:E

第3题:

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()

A. FWSM routes traffic between the VLANs.

B. FWSM switches traffic between the VLANs.

C. Transparent mode is often called bump-in-the-wire mode.

D. Transparent mode firewall deployments are used most often in current designs.

E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.


参考答案:B, C

第4题:

What is a benefit of NTLMSSP over basic authentication?() 

  • A、 basic cannot be used in transparent proxy mode
  • B、 basic requiresreauthentication with every new domain
  • C、 NTLMSSP is compatible with open LDAP
  • D、 NTLMSSP is more secure than basic

正确答案:D

第5题:

Which GSS "source access list" is used to allow access to GSS by clients when GSS is being used as the DNS?()

  • A、 Client IP
  • B、 Proxy IP
  • C、 Client and proxy IP
  • D、 Neither client nor proxy IP

正确答案:A

第6题:

What is the name of the VTP mode of operation that enables a switch to forward only VTPadvertisements while still permitting the editing of local VLAN information?()

A.server

B.client

C.tunnel

D.transparent


参考答案:D

第7题:

Which three of the following descriptions are true about the firewall modes? ()

  • A、 Transparent mode is layer 2.
  • B、 Routed mode is layer 3.
  • C、 Routed mode has 1 IP address.
  • D、 Transparent mode has 1 IP address.

正确答案:A,B,D

第8题:

What is the name of the VTP mode of operation that enables a switch to forward only VTP advertisements while still permitting the editing of local VLAN information?()

A. server

B. client

C. tunnel

D. transparent


参考答案:D

第9题:

The enable secret command is used to secure access to which CLI mode?()

  • A、user EXEC mode
  • B、global configuration mode
  • C、privileged EXEC mode
  • D、auxiliary setup mode

正确答案:C

第10题:

What is the name of the VTP mode of operation that enables a switch to forward only VTPadvertisements while still permitting the editing of local VLAN information?()

  • A、server
  • B、client
  • C、tunnel
  • D、transparent

正确答案:D

更多相关问题