儿科护理专业实践能力

单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch po

题目
单选题
Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()
A

The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port

B

The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.

C

The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port

D

The default network setting is HIGH

参考答案和解析
正确答案: D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement describes the primary difference between the WX and WXC platforms?()

A. The WX platform has built-in hard drives.

B. The WXC platform has no built-in hard drives.

C. The WX platform uses Network Sequence Caching technology.

D. The WXC platform uses the Network Sequence Caching technology


参考答案:D

第2题:

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

A.pubic]
B.private]
C.personal
D.proper

答案:B
解析:

第3题:

You want to set the following initialization parameters for your database instance:Identify the statement that correctly describes this setting.()

A. The MANDATORY location must be a flash recovery area.

B. The optional destinations may not use the flash recovery area.

C. This setting is not allowed because the first destination is not set as MANDATORY.

D. The online redo log file is not allowed to be overwritten if the archived log cannot be created in the fourth destination.


参考答案:D

第4题:

A network vulnerability scanner is part of which critical element of network and system security?()

  • A、host security
  • B、perimeter security
  • C、security monitoring
  • D、policy management

正确答案:C

第5题:

The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()

  • A、 ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.
  • B、 ISRs provide the framework to integrate and extend wired and wireless networks
  • C、 ISRs provide concurrent security, voice, data, wireless, and application optimization services.
  • D、 ISRS provide the common fabric, functionality, and CLI across the network.

正确答案:C

第6题:

A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()

A.Worm

B.Smurf

C.Logic Bomb

D.Man-in-the-middle


参考答案:B

第7题:

Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()

  • A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port
  • B、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.
  • C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port
  • D、The default network setting is "HIGH"

正确答案:B

第8题:

Which statement describes a security zone?()

A. A security zone can contain one or more interfaces.

B. A security zone can contain interfaces in multiple routing instances.

C. A security zone must contain two or more interfaces.

D. A security zone must contain bridge groups.


参考答案:A

第9题:

Which statement describes the behavior of a security policy?()

  • A、The implicit default security policy permits all traffic.
  • B、Traffic destined to the device itself always requires a security policy.
  • C、Traffic destined to the device’s incoming interface does not require a security policy.
  • D、The factory-default configuration permits all traffic from all interfaces.

正确答案:C

第10题:

Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()

  • A、The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSR
  • B、TTL propagation cannot be disabled in an MPLS domain
  • C、TTL propagation is only disabled on the ingress edge LSR
  • D、The TTL field of the MPLS label header is set to 255
  • E、The TTL field of the IP packet is set to 0

正确答案:D

更多相关问题