网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
A
It is applied only on the input interface of a router.
B
It is applied only on the output interface of a router.
C
It can be configured either on the input or output interface of a router.
D
It cannot be configured on a router interface.
E
It is configured under any routing protocol process.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A It is applied only on the input interface of a router.B It is applied only on the output interface of a router.C It can be configured either on the input or output interface of a router.D It cannot be configured on a router interface.E It is configured under any routing protocol process.” 相关考题
考题
Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()
A. ip sa-validateB. ip split-horizonC. ip access-routesD. ip filter-options
考题
By default, which two statements are true about export routing polices?()
A. Export polices can evaluate only active routesB. Export polices can evaluate all routesC. Export polices can be applied to the forwarding tableD. Export polices can be applied to interfaces
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.
考题
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.
考题
What does the mac packet-classify command do when applied to an interface configuration?()A、 It enables MAC ACLs to be applied to only IP packets that enter the interface.B、 It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C、 It enables MAC ACLs to be applied to all packets that enter the interface.D、 It enables MAC ACLs to be used for QoS settings.
考题
For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()A、ip verify unicast source reachable-via anyB、ip verify unicast reverse-pathC、ip verify unicast reverse-path looseD、ip verify unicast reverse-path strict
考题
Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()A、ip sa-validateB、ip split-horizonC、ip access-routesD、ip filter-options
考题
By default, which two statements are true about export routing policies?()A、Export policies can evaluate only active routesB、Export policies can evaluate all routesC、Export policies can be applied to the forwarding tableD、Export policies can be applied directly to interfaces
考题
Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
考题
For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?()A、ip verify unicast source reachable-via anyB、ip verify unicast reverse-pathC、ip verify unicast reverse-path looseD、ip verify unicast reverse-path strict
考题
Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface
考题
Unicast Reverse Path Forwarding can perform all of these actions except which one?()A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB、check to see if any packet received at a router interface arrives on the best return pathC、combine with a configured ACLD、log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE、inspect IP packets encapsulated in tunnels, such as GRE
考题
What is true about access control on bridged and routed VLAN traffic?()A、Router ACLs can be applied to the input and output directions of a VLAN interfaceB、Bridged ACLs can be applied to the input and output directions of a VLAN interfaceC、Only router ACLs can be applied to a VLAN interfaceD、VLAN maps and router ACLs can be used in combinationE、VLAN maps can be applied to a VLAN interfac
考题
By default, which two statements are true about export routing polices?()A、Export polices can evaluate only active routesB、Export polices can evaluate all routesC、Export polices can be applied to the forwarding tableD、Export polices can be applied to interfaces
考题
By default, which two statements are true about export routing policies?()A、Export policies can evaluate only active routes.B、Export policies can evaluate all routes.C、Export policies can be applied to the forwarding table.D、Export policies can be applied directly to interfaces
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
单选题What does the mac packet-classify command do when applied to an interface configuration?()A
It enables MAC ACLs to be applied to only IP packets that enter the interface.B
It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C
It enables MAC ACLs to be applied to all packets that enter the interface.D
It enables MAC ACLs to be used for QoS settings.
考题
单选题Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()A
ip sa-validateB
ip split-horizonC
ip access-routesD
ip filter-options
考题
单选题Which of the following IOS features can prevent IP spoofing attacks?()A
PPP over EthernetB
Cisco Express forwardingC
MPLS traffic EngineeringD
IS-IS routingE
Unicast Reverse Path Forwarding(uRPF)
考题
多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL
考题
单选题Unicast Reverse Path Forwarding can perform all of these actions except which one?()A
examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB
check to see if any packet received at a router interface arrives on the best return pathC
combine with a configured ACLD
log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE
inspect IP packets encapsulated in tunnels, such as GRE
考题
多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
考题
多选题What is true about access control on bridged and routed VLAN traffic? ()ARouter ACLs can be applied to the input and output directions of a VLAN interface.BBridged ACLs can be applied to the input and output directions of a VLAN interface.COnly router ACLs can be applied to a VLAN interface.DVLAN maps and router ACLs can be used in combination.EVLAN maps can be applied to a VLAN interface
考题
多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.
热门标签
最新试卷