儿科护理专业实践能力

多选题Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()AIt can be used to block bulk encryption attacksBIt can be used to protect against denial of service attacksCTraffic originating from the router is considered trusted, so i

题目
多选题
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
A

It can be used to block bulk encryption attacks

B

It can be used to protect against denial of service attacks

C

Traffic originating from the router is considered trusted, so it is not inspected

D

Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently

E

Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

参考答案和解析
正确答案: A,D
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()

A.The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.

B.The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.

C.The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.

D.The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.


参考答案:B, C

第2题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第3题:

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)

A. rate limiting of ICMP

B. RADIUS authorizations

C. source address validation

D. stateful firewall on the router


参考答案:A, C

第4题:

Which three statements are true about Cisco IOS Firewall?()

  • A、It can be configured to block Java traffic.
  • B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
  • C、It can only examine network layer and transport layer information.
  • D、It can only examine transport layer and application layer information.
  • E、The inspection rules can be used to set timeout values for specified protocols.
  • F、The ip inspect cbac-name command must be configured in global configuration mode.

正确答案:A,B,E

第5题:

Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

  • A、show inventory
  • B、show flash:filesys
  • C、dirflash:include chassis
  • D、show diag
  • E、show controllers

正确答案:A,D

第6题:

Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()

A.show inventory

B.show flash:filesys

C.dirflash:include chassis

D.show diag

E.show controllers


参考答案:A, D

第7题:

Which two statements about the Cisco Nexus 1000V VSM are true?()

  • A、It performs switching decisions and forwarding for the VEM
  • B、It can be run on a virtual machine
  • C、It can be used for remote VEM switching Iine cards

正确答案:B,C

第8题:

Which two statements are correct about firewall filters in the Junos OS?()

A. Firewall filters are stateless.

B. Firewall filters are used to control routing information that is exchanged between devices.

C. Firewall filters are used to control traffic passing through the device.

D. Firewall filters can only be applied to traffic entering the device.


参考答案:A, C

第9题:

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()

  • A、It can be used to block bulk encryption attacks
  • B、It can be used to protect against denial of service attacks
  • C、Traffic originating from the router is considered trusted, so it is not inspected
  • D、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
  • E、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

正确答案:B,E

第10题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption.

正确答案:A,D

更多相关问题