多项选择题X 纠错

A.An HTTP SDF file location can be specified by clicking the Add button.
B.If all specified SDF locations fail to load, the signature file that is named default.sdf will be loaded.
C.The Autosave feature automatically saves the SDF alarms if the router crashes.
D.The Autosave feature is automatically enabled for the default built-in signature file.
E.The name of the built-in signature file is default.sdf.
F.The Use Built-In Signatures (as backup) check box is selected by default.

参考答案:
查答案就用赞题库小程序 还有拍照搜题 语音搜题 快来试试吧
无需下载 立即使用

你可能喜欢

多项选择题

A.version
B.experimental
C.label
D.protocol
E.TTL
F.bottom-of-stack indicato

多项选择题

A.The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B.The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C.The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D.The tunnel mode gre command must be configured on the Tunnel0 interface.
E.The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F.The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.

单项选择题

A.Pings are allowed only to specific devices.
B.CDP information is not exchanged.
C.Port scans can no longer be run.
D.Some network diagnostic data is lost.
E.Wireless devices need to be physically connected to the edge device.
F.OSPF routing needs the command ip ospf network non-broadcast enabled.

单项选择题

A.Human interaction is required to facilitate the spread.
B.The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
C.Extremely large volumes of requests are sent over a network or over the Internet.
D.Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.

多项选择题

A.reset the connection
B.forward the packet
C.check the packet against an ACL
D.drop the packet

多项选择题

A.A received IP packet is forwarded based on the IP destination address and the packet is sent as an IP packet.
B.An IP destination exists in the IP forwarding table. A received labeled packet is dropped because the label is not found in the LFIB table.
C.There is an MPLS label-switched path toward the destination. A received IP packet is dropped because the destination is not found in the IP forwarding table.
D.A received IP packet is forwarded based on the IP destination address and the packet is sent as a labeled packet.
E.A received labeled IP packet is forwarded based upon both the label and the IP address.
F.A received labeled packet is forwarded based on the label. After the label is swapped,the newly labeled packet is sent.

单项选择题

A.Decrease the maximum MTU requirements on all router interfaces that are attached to the LAN segment.
B.Increase the maximum MTU requirements on all router interfaces that are attached to the LAN segment.
C.No additional configuration is required. Interface MTU size will be automatically adjusted to accommodate the larger size frames.
D.No additional configuration is required. Frames with larger MTU size will be automatically fragmented and forwarded on all LAN segments.

单项选择题

A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.

多项选择题

A.If the VPN server is configured for Xauth, the VPN client waits for a username / password challenge.
B.The Cisco Easy VPN feature only supports transform sets that provide authentication and encryption.
C.The VPN client initiates aggressive mode (AM) if a pre-shared key is used for authentication during the IKE phase 1 process.
D.The VPN client verifies a server username/password challenge by using a AAA authentication server that supports TACACS+ or RADIUS.
E.The VPN server can only be enabled on Cisco PIX Firewalls and Cisco VPN 3000 series concentrators.
F.When connecting with a VPN client,the VPN server must be configured for ISAKMP group 1,2 or 5.

多项选择题

A.Configure SNMP with only read-only community strings.
B.Encrypt TFTP and syslog traffic in an IPSec tunnel.
C.Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.
D.Synchronize the NTP master clock with an Internet atomic clock.
E.Use SNMP version 2.
F.Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.

赞题库

赞题库-搜题找答案

(已有500万+用户使用)


  • 历年真题

  • 章节练习

  • 每日一练

  • 高频考题

  • 错题收藏

  • 在线模考

  • 提分密卷

  • 模拟试题

无需下载 立即使用

版权所有©考试资料网(ppkao.com)All Rights Reserved