网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
A

 RFC 1149

B

 RFC 3704

C

 RFC 1918

D

 RFC 2827


参考答案

参考解析
解析: 暂无解析
更多 “单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A  RFC 1149B  RFC 3704C  RFC 1918D  RFC 2827” 相关考题
考题 When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? () A. IPsec RoutingB. Access ControlC. IP Address PoolD. Source Interface

考题 Which configuration command controls the source IP address for packets sent to a RADIUS server?() A.radius override nas-ip-addrB.radius source-ip-address 10.13.7.55C.radius update-source-address 10.13.7.11D.radius authentication server 10.13.7.55

考题 When an IP packet is Layer 3-switched from a source in one VLAN to a destination in another VLAN,which field in a packet will be rewritten? () A. Layer 2 TTLB. Layer 3 TTLC. Layer 3 source addressD. Layer 3 transport protocolE. Layer 3 destination address

考题 Refer to the exhibit. What will Router1 do when it receives the data frame shown?() A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.E.Router1 will forward the data packet out interface FastEthernet0/1.F.Router1 will forward the data packet out interface FastEthernet0/2.

考题 Your boss is learning a CCNA training course,refer to the exhibit.The access list has been configured on the S0/0 interface of router RTB in the outbound direction.Which two packets,if routed to the interface,will be denied?()access-list 101 denytcp192.168.15.320.0.0.15any eq telnetaccess-list 101 permitip any anyA.source ip address:192.168.15.5;destination port: 21B.source ip address:,192.168.15.37 destination port: 21C.source ip address:,192.168.15.41 destination port: 21D.source ip address:,192.168.15.36 destination port: 23E.source ip address:192.168.15.46;destination port: 23F.source ip address:,192.168.15.49 destination port: 23

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

考题 根据下图,该access list被配置在路由器RTB的S0/0接口上的OUT方向,哪两个数据包会被DENY,如果被路由到该接口上的话?() A.source ip address:192.168.15.5 destination port:21B.source ip address:192.168.15.37 destination port:21C.ssource ip address192.168.15.41 destination port:21D.source ip address:192.168.15.36 destination port:23E.source ip address:192.168.15.46 destination port:23F.source ip address:192.168.15.49 destination port:23

考题 Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

考题 You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface

考题 When an IP packet is Layer 3-switched from a source in one VLAN to a destination in another VLAN,which field in a packet will be rewritten? ()A、Layer 2 TTLB、Layer 3 TTLC、Layer 3 source addressD、Layer 3 transport protocolE、Layer 3 destination address

考题 Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces?()A、IP precedence bitsB、DSCP bitsC、original port numbersD、DE bitsE、source IP addressF、destination IP address

考题 A server has been assigned the 192.168.100.127/25 IP address. The server is experiencing strange network connectivity related problems. Which of the following would BEST describe the problem?()A、IP address is classful.B、IP address is a subnet broadcast address.C、IP address is a subnet network address.D、IP address is classless

考题 Which three attributes are carried in a source active message?()A、NLRI informationB、IP address of originating RPC、address of multicast sourceD、all active RPs in the local domainE、group address to which the source is sending

考题 Which statement describes the behavior of source NAT with address shifting?()A、Source NAT with address shifting translates both the source IP address and the source port of a packet.B、Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.C、Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.D、Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.

考题 When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

考题 Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or bothB、 Hash URL: Selects the server by using a hash value based on the requested URLC、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothD、 Hash header: Selects the server by using a hash value based on the HTTP header nameE、 Hash IP: Selects the server using a hash value based on the IP address

考题 When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()A、Access Lists between the inside interface and loopback interfaceB、Context Based Access ControlC、Dynamic Host Configuration ProtocolD、Network Address translation

考题 What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.

考题 When the Infranet Enforcer is set up in transparent mode, which additional resource policy must be configured to use OAC for IPsec enforcement? ()A、IPsec RoutingB、Access ControlC、IP Address PoolD、Source Interface

考题 单选题Which configuration command controls the source IP address for packets sent to a RADIUS server?()A radius override nas-ip-addrB radius source-ip-address 10.13.7.55C radius update-source-address 10.13.7.11D radius authentication server 10.13.7.55

考题 单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A  RFC 1149B  RFC 3704C  RFC 1918D  RFC 2827

考题 单选题When an IP packet is Layer 3-switched from a source in one VLAN to a destination in another VLAN,which field in a packet will be rewritten? ()A Layer 2 TTLB Layer 3 TTLC Layer 3 source addressD Layer 3 transport protocolE Layer 3 destination address

考题 单选题When an IP packet is Layer 3-switched from a source in one VLAN to a destination in anotherVLAN, which field in a packet will be rewritten? ()A Layer 2 TTLB Layer 3 TTLC Layer 3 source addressD Layer 3 transport protocolE Layer 3 destination address

考题 单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 单选题Which statement describes the behavior of source NAT with address shifting?()A Source NAT with address shifting translates both the source IP address and the source port of a packet.B Source NAT with address shifting defines a one-to-one mapping from an original source IP address to a translated source IP address.C Source NAT with address shifting can translate multiple source IP addresses to the same translated IP address.D Source NAT with address shifting allows inbound connections to be initiated to the static source pool IP addresses.

考题 单选题What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A The best match of the ACL entries will be used for granularity of control.B They use source IP information for matching operations.C They use source and destination IP information for matching operations.D They use source IP information along with protocol-type information for finer granularity of control.

考题 单选题In what situation would the command ip helper-address be required?(Choose the best answer.)()A Only when there is a duplicate IP address caused by a combination of static and dynamic IPaddress allocationsB On each router that exists between the client and the serverC Only when a router separates the client from the serverD Only if the DHCP sever issues a DHCPNAK to the initial requestE Only when the client is on the same subnet as the serverF Only when the DHCP pool is out of IP addresses