网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
In base e-Commerce module designs, where should firewall perimeters be placed? ()
A
core layer
B
Internet boundary
C
aggregation layer
D
aggregation and core layers
E
access and aggregation layers
参考答案
参考解析
解析:
暂无解析
更多 “单选题In base e-Commerce module designs, where should firewall perimeters be placed? ()A core layerB Internet boundaryC aggregation layerD aggregation and core layersE access and aggregation layers” 相关考题
考题
One should always _____ facts.
A、base one's opinion onB、base one's opinion inC、base one opinion onD、base one opinion in
考题
Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.
考题
Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?()
A.B.C.D.
考题
What is the purpose of unicast reverse path forwarding?()
A. to validate packet receipt on interfaces where the traffic should be receivedB. to forward packets out the interfaces where the traffic should be receivedC. to forward packets out the interfaces where the traffic should be sentD. to validate packet receipt on interfaces where the traffic should be sent
考题
Where should you install the spare line module in a redundancy group?()
A.last slot in the chassisB.first slot in the chassisC.lowest numbered slot in thegroupD.highest numbered slot in the group
考题
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
考题
In a base e-Commerce module design, which routing statement is correct?()
A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.
考题
In base e-Commerce module designs, where should firewall perimeters be placed?()
A. core layerB. Internet boundaryC. aggregation layerD. aggregation and core layersE. access and aggregation layers
考题
When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A、by tracking the status of objects along the path to the e-commerce moduleB、by detecting undesirable conditions along the path to the e-commerce moduleC、by using the MED to communicate the site preferences for traffic to multiple ISPsD、by communicating the available prefixes, routing policies, and preferences of each site to its ISPE、by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
考题
You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON
考题
What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.
考题
In base e-Commerce module designs, where should firewall perimeters be placed? ()A、 core layerB、 Internet boundaryC、 aggregation layerD、 aggregation and core layersE、 access and aggregation layers
考题
A customer is considering an Intel processor-based blade solution from a competitor. The customer is willing to share only the information that the competitor offers 96 Xeon processors per rack. Which of the following IBM BladeCenter E benefits should the Sales Specialist emphasize first?()A、Redundant BlowersB、Availability of AMD and Intel ProcessorsC、Processor densityD、Advanced Management Module
考题
What is the purpose of unicast reverse path forwarding?()A、to validate packet receipt on interfaces where the traffic should be receivedB、to forward packets out the interfaces where the traffic should be receivedC、to forward packets out the interfaces where the traffic should be sentD、to validate packet receipt on interfaces where the traffic should be sent
考题
Where is the IS-IS Network Entity Title configured?()A、per IP interfaceB、per virtual routerC、only on LAN interfacesD、only on WAN interfaces
考题
You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()A、On the Oracle server. B、Locally in each form module. C、In an attached PL/SQL library D、On your file network server.
考题
单选题What is a virtual firewall?()A
another name for a firewall deployed in routed modeB
another name for a firewall deployed in transparent modeC
a separation of multiple firewall security contexts on a single firewallD
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE
a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
单选题On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()A
sshB
connectC
loginD
session
考题
单选题When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A
by tracking the status of objects along the path to the e-commerce moduleB
by detecting undesirable conditions along the path to the e-commerce moduleC
by using the MED to communicate the site preferences for traffic to multiple ISPsD
by communicating the available prefixes, routing policies, and preferences of each site to its ISPE
by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
考题
单选题You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()A
On the Oracle server. B
Locally in each form module. C
In an attached PL/SQL library D
On your file network server.
考题
单选题Where should you install the spare line module in a redundancy group?()A
last slot in the chassisB
first slot in the chassisC
lowest numbered slot in thegroupD
highest numbered slot in the group
考题
单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A
another name for a firewall deployed in routed modeB
another name for a firewall deployed in transparent modeC
a separation of multiple firewall security contexts on a single firewallD
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
考题
单选题In base e-Commerce module designs, where should firewall perimeters be placed?()A
core layerB
Internet boundaryC
aggregation layerD
aggregation and core layersE
access and aggregation layers
考题
单选题In base e-Commerce module designs, where should firewall perimeters be placed? ()A
core layerB
Internet boundaryC
aggregation layerD
aggregation and core layersE
access and aggregation layers
考题
单选题In a base e-Commerce module design, which routing statement is correct?()A
Routing is mostly static.B
Hardcoded IP addresses are used to support failover.C
Inbound servers use the CSM or ACE as the default gateway.D
VLANs between the access layer switches are used for FHRP protocols.
考题
单选题The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A
another name for a firewall deployed in routed modeB
another name for a firewall deployed in transparent modeC
a separation of multiple firewall security contexts on a single firewallD
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
热门标签
最新试卷