网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which is a benefit of implementing RFC 2827?()
A
Prevents DoS from legimate, non-hostile end systems
B
Prevents disruption of special services, such as Mobile IP
C
Defeats DoS Attacks which employ IPSource Address Spoofing
D
Restricts directed broadcasts at the ingress router
E
Allows DHCP or BOOTP packets to reach the relay agents asappropriate
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which is a benefit of implementing RFC 2827?()A Prevents DoS from legimate, non-hostile end systemsB Prevents disruption of special services, such as Mobile IPC Defeats DoS Attacks which employ IPSource Address SpoofingD Restricts directed broadcasts at the ingress routerE Allows DHCP or BOOTP packets to reach the relay agents asappropriate” 相关考题
考题
A BGP router should use three export policies named add-communities, no-rfc1918-routes, andrejected-unwanted. Which export statement places the add-communities policy immediately before the default BGP policy?()A. export [add-communities no-rfc1918-routes rejected-unwanted];B. export [no-rfc1918-routes add-communities rejected-unwanted];C. export [add-communities rejected-unwanted no-rfc1918-routes];D. export [no-rfc1918-routes rejected-unwanted add-communities];
考题
WhatareBCP38(BestCommonPractices38)/RFC2827IngressPacketFilteringPrinciples?()
A.FilterSmurfICMPpackets.B.FilterasclosetothecoreaspossibleC.FilterasclosetotheedgeaspossibleD.FilteraspreciselyaspossibleE.Filterbothsourceanddestinationwherepossible
考题
BCP(BestCommonPractices)38/RFC2827IngressandEgressPacketFilteringwouldhelpmitigatewhatclassificationofattack?()
A.SniffingattackB.DenialofserviceattackC.PortScanattackD.ReconnaisanceattackE.Spoofingattack
考题
WhenimplementingbestpracticesforIPSourceAddressSpoofingandDefeatingDenialofServiceAttackswithIPSourceAddressSpoofing,whatRFCiscommonlyusedtoprotectyournetwork?()
A.RFC1149B.RFC3704C.RFC1918D.RFC2827
考题
Whichis abenefitofimplementing RFC2827?()
A.PreventsDoSfromlegimate,non-hostileendsystemsB.Preventsdisruptionofspecialservices,suchasMobileIPC.DefeatsDoSAttackswhichemployIPSourceAddressSpoofingD.RestrictsdirectedbroadcastsattheingressrouterE.AllowsDHCPorBOOTPpacketstoreachtherelayagentsasappropriate
考题
The most commonly used locking level in implementing concurrency control is at which of the following levels?A.databaseB.tableC.recordD.field
考题
What is a benefit of implementing a Cisco End-to-End Solution?()A、It maximizes the network securityB、It increase the cost of the equipmentC、It enables the network to work as a unified wholeD、It reduces the Cost of equipment
考题
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()A、PPPoE with the 827 configured as a bridgeB、PPPoE with the 827 configured as the PPPoE clientC、PPPoAD、RFC 1483 Bridged with the 827 configured as the PPPoE clientE、RFC 1482 Bridged with the 827 configured as a bridge
考题
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()A、 RFC 1769 and mere publicationsB、 Real standards of RFC 1918C、 RFC 1669 real standards andmere publicationsD、 Real standards and mere publications RFC 1796E、 None of the above
考题
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827
考题
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()A、Filter Smurf ICMP packets.B、Filter as close to the core as possibleC、Filter as close to the edge as possibleD、Filter as precisely as possibleE、Filter both source and destination where possible
考题
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack
考题
Which of these tables is used by an LSR to perform a forwarding lookup for a packet destined to an address within an RFC 4364 VPN?()A、CEFB、FIBC、LFIBD、IGP
考题
Which is a benefit of implementing RFC 2827?()A、Prevents DoS from legimate, non-hostile end systemsB、Prevents disruption of "special services", such as Mobile IPC、Defeats DoS Attacks which employ IPSource Address SpoofingD、Restricts directed broadcasts at the ingress routerE、Allows DHCP or BOOTP packets to reach the relay agents asappropriate
考题
Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.
考题
Which of the following is a benefit of NAS over SAN?()A、Higher data integrityB、Lower cost of implementationC、Higher redundancyD、Increased performance
考题
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
考题
A global customer’s IT strategy is based upon two DS8000 systems and an N series gateway. They want to protect their business by implementing a disaster recovery solution. The storage specialist has recommended cascaded mirroring. Which of the following is the business benefit of cascaded replication()A、it is cost efficient, as a single N series or DS8000 can have its controllers split between the primary and secondary site and use semi- synchronousmirroring while using asynchronous mirroring to a third siteB、the second site acts as a repeater station so that greater geographical distances can be achievedC、ITprovides high availability together with disaster recovery by implementing Metro/Global Mirror across three geographically dispersed systemsD、it guarantees data protection by implementing two synchronous copies of the primary site data
考题
Which technology/feature is designed to maximize the benefit of using SSD drives? ()A、Easy TierB、FlashCopyC、EncryptionD、Metro Mirror
考题
Which of the following lists of items all require an HMC to function with POWER5?()A、Running AIX 5.3 Implementing HACMP Implementing Static LPARB、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning
考题
单选题When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()A
RFC 1769 and mere publicationsB
Real standards of RFC 1918C
RFC 1669 real standards andmere publicationsD
Real standards and mere publications RFC 1796E
None of the above
考题
单选题Which of the following lists of items all require an HMC to function with POWER5?()A
Running AIX 5.3 Implementing HACMP Implementing Static LPARB
Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC
Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned OnD
Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning
考题
单选题Which of the following BEST describes a benefit of RAID 0?()A
High fault toleranceB
Ease of failure recoveryC
High performanceD
No configuration
考题
单选题What is the benefit of implementing a Cisco end-to-end solution?()A
It enables the network to work as a unified wholeB
It maximizes the network securityC
It increases the cost of the equipmentD
It reduces the cost of the equipment
考题
单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A
RFC 1149B
RFC 3704C
RFC 1918D
RFC 2827
考题
单选题A BGP router should use three export policies named add-communities, no-rfc1918-routes, and rejected-unwanted. Which export statement places the add-communities policy immediately before the default BGP policy?()A
export [add-communities no-rfc1918-routes ejected-unwanted];B
export [no-rfc1918-routes add-communities rejected-unwanted];C
export [add-communities rejected-unwanted no-rfc1918-routes];D
export [no-rfc1918-routes rejected-unwanted add-communities];
考题
多选题What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()AFilter Smurf ICMP packets.BFilter as close to the core as possibleCFilter as close to the edge as possibleDFilter as precisely as possibleEFilter both source and destination where possible
考题
单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A
Sniffing attackB
Denial of service attackC
Port Scan attackD
Reconnaisance attackE
Spoofing attack
热门标签
最新试卷