网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following would restrict traffic from a specific host to a network?()

  • A、MIBs
  • B、NAS
  • C、ACL
  • D、SMTP

参考答案

更多 “Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP” 相关考题
考题 Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

考题 Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?() A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

考题 Which of the following would be used to optimize network performance and increase bandwidth availability?() A. Packet analysisB. QoSC. Traffic shapingD. Fault tolerance

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 Which of the following devices would need to be configured to block specific ports and protocols from entering the network?() A. BridgeB. FirewallC. Port replicatorD. Gateway

考题 Whichofthefollowingwouldrestricttrafficfromaspecifichosttoanetwork?() A.MIBsB.NASC.ACLD.SMTP

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 Which of the following traffic types would a network layer firewall be unable to filter?() A.SMTP trafficB.ICMP messagesC.HTTP trafficD.Email sender verification

考题 You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN:access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 anyWhat will the effect of this access list be?()A. All traffic will be allowed to out of E0 except FTP traffic.B. FTP traffic from 192.168.1.22 to any host will be blocked.C. FTP traffic from 192.168.1.9 to any host will be blocked.D. All traffic will be prevented from leaving E0.E. All FTP traffic to network 192.168.1.9/29 from any host will be blocked.

考题 Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

考题 Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }A、DNS traffic is denied.B、HTTP traffic is denied.C、FTP traffic is permitted.D、SMTP traffic is permitted.

考题 Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

考题 Which of the following would be used to optimize network performance and increase bandwidth availability?()A、Packet analysisB、QoSC、Traffic shapingD、Fault tolerance

考题 Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

考题 Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering

考题 A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

考题 Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification

考题 Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 A host is to be part of a very small private network, which will never be connected to any other networks.  Which of the following name resolution schemes would be the easiest to implement?()A、DNSB、NISC、DHCPD、etc/hosts file

考题 You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

考题 Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A、DNS traffic is denied.B、Telnet traffic is denied.C、SMTP traffic is denied.D、Ping traffic is permitted

考题 单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A  Inadequate RAMB  Slow processorC  PCI busD  Excessive network traffic

考题 单选题Which of the following traffic types would a network layer firewall be unable to filter?()A SMTP trafficB ICMP messagesC HTTP trafficD Email sender verification

考题 单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A HoneynetB HoneypotC Vulnerability scannerD Network based IDS

考题 单选题Which of the following would restrict traffic from a specific host to a network?()A MIBsB NASC ACLD SMTP