网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which parameters are valid SCREEN options for combating operating system probes?()
- A、syn-fin, syn-flood, and tcp-no-frag
- B、syn-fin, port-scan, and tcp-no-flag
- C、syn-fin, fin-no-ack, and tcp-no-frag
- D、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
参考答案
更多 “Which parameters are valid SCREEN options for combating operating system probes?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag” 相关考题
考题
Which parameters are valid SCREEN options for combating operating system probes?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which two statements about the use of SCREEN options are correct? ()(Choose two.)
A. SCREEN options offer protection against various attacksB. SCREEN options are deployed prior to route and policy processing in first path packet processingC. SCREEN options are deployed at the ingress and egress sides of a packet flowD. SCREEN options, you must take special care to protect OSPF
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.
考题
Which parameters must you select when configuring operating system probes SCREEN options?()
A. syn-fin, syn-flood, and tcp-no-fragB. syn-fin, port-scan, and tcp-no-flagC. syn-fin, fin-no-ack, and tcp-no-fragD. syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which are valid statements about Cisco Virtual Interface Card (VIC)? ()A、 The Cisco VIC can create an unlimited number of Virtual NICsB、 The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksC、 vNICs are created using software on the host operating systemD、 The host operating system sees a vNIC as a physical PCIe deviceE、 The host operating system sees a vNIC as a sub-interface of a primary NICF、 The Cisco VIC can create 1024 vNICs
考题
Which of the following is a valid source for Windows operating system updates?()A、SNAB、RISC、RASD、WSUS
考题
Which two statements about the use of SCREEN options are correct? ()(Choose two.)A、SCREEN options offer protection against various attacksB、SCREEN options are deployed prior to route and policy processing in first path packet processingC、SCREEN options are deployed at the ingress and egress sides of a packet flowD、SCREEN options, you must take special care to protect OSPF
考题
Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()A、 HTTPB、 Java scriptingC、 TCL scriptingD、 RADIUSE、 TACACS
考题
Which of the following will help protect an operating system from vulnerability?()A、Download free anti-virus programs from the Internet.B、Perform updates from the manufacturers website regularly.C、Using the operating systems email program only to open attachments.D、Monitoring what is displayed on the screen.
考题
When configuring the messaging system, which of the following are valid parameters for the file transport? ()A、File NameB、Operating SystemC、LocationD、HostE、Mode
考题
Which two functions of JUNOS Software are handled by the data plane?()A、NATB、OSPFC、SNMPD、SCREEN options
考题
Which two statements about the use of SCREEN options are correct?()A、SCREEN options are deployed at the ingress and egress sides of a packet flow.B、Although SCREEN options are very useful, their use can result in more session creation.C、SCREEN options offer protection against various attacks at the ingress zone of a packet flow.D、SCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.
考题
Which parameters must you select when configuring operating system probes SCREEN options?()A、syn-fin, syn-flood, and tcp-no-fragB、syn-fin, port-scan, and tcp-no-flagC、syn-fin, fin-no-ack, and tcp-no-fragD、syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)A、NATB、OSPFC、SNMPD、SCREEN options
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
考题
Which three advanced permit actions within security policies are valid?()A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
考题
You plan to take a closed database backup using operating system commands. Which three SHUTDOWN options are appropriate for this type of backup?()A、ABORTB、NORMALC、IMMEDIATED、TRANSACTIONAL
考题
Which of these are valid Flashback Database recovery point parameters?() A、 SCNB、 TimestampC、 Named recovery pointD、 Transaction IDE、 Session ID
考题
多选题Which of these are valid Flashback Database recovery point parameters?()ASCNBTimestampCNamed recovery pointDTransaction IDESession ID
考题
多选题Which three advanced permit actions within security policies are valid?()AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.
考题
多选题Which three values are valid parameters for the DO_KEY built-in?()AENTERBGO_ITEMCVALIDATEDEXIT_FORMEEXECUTE_QUERY
考题
多选题Which are valid statements about Cisco Virtual Interface Card (VIC)? ()AThe Cisco VIC can create an unlimited number of Virtual NICsBThe number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinksCvNICs are created using software on the host operating systemDThe host operating system sees a vNIC as a physical PCIe deviceEThe host operating system sees a vNIC as a sub-interface of a primary NICFThe Cisco VIC can create 1024 vNICs
考题
单选题Which parameters are valid SCREEN options for combating operating system probes?()A
syn-fin, syn-flood, and tcp-no-fragB
syn-fin, port-scan, and tcp-no-flagC
syn-fin, fin-no-ack, and tcp-no-fragD
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
考题
多选题Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()AHTTPBJava scriptingCTCL scriptingDRADIUSETACACS
考题
多选题When configuring the messaging system, which of the following are valid parameters for the file transport? ()AFile NameBOperating SystemCLocationDHostEMode
考题
单选题Which parameters must you select when configuring operating system probes SCREEN options?()A
syn-fin, syn-flood, and tcp-no-fragB
syn-fin, port-scan, and tcp-no-flagC
syn-fin, fin-no-ack, and tcp-no-fragD
syn-fin, syn-ack-ack-proxy, and tcp-no-frag
热门标签
最新试卷